Publications

Export 647 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Holló C..  2011.  Üzleti webtechnológiák.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimothy T.  2019.  Code Coverage Differences of Java Bytecode and Source Code. Software Quality Journal. 27(1):79-123.
Horváth F, Bognár S, Gergely Tamás, Rácz R, Beszédes Á, Marinković V.  2014.  Code Coverage Measurement Framework for Android Devices. Acta Cybernetica. 21:439-458.
Horváth E, Forgács I, Kiss Á, Jász Judit, Gyimóthy T.  2005.  General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the Estonian Academy of Sciences – Engineering. 11:286–295.
Horváth E, Jász Judit.  2006.  Comparison of static- and dynamic call graphs. Volume of Extended Abstracts of 5th Conference of PhD Students in Computer Science (CSCS 2006). :56.
Horváth D, Csuvik V, Gyimóthy T, Vidács L.  2023.  An Extensive Study on Model Architecture and Program Representation in the Domain of Learning-based Automated Program Repair. 2023 IEEE/ACM International Workshop on Automated Program Repair (APR). :31-38.
Horváth T, Alexin Z, Gyimóthy T, Fábricz K.  1990.  Towards a Multilingual Natural Language Understanding Interface (Extended Abstract). CC. :217-218.
Horváth F, la Vancsics B, Vidács L, Beszédes Á, Tengeri D, Gergely Tamás, Gyimóthy T.  2015.  Test Suite Evaluation using Code Coverage Based Metrics. Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15). :46-60.
Horváth F, Beszédes Á, la Vancsics B, Balogh G, Vidács L, Gyimóthy T.  2020.  Experiments with Interactive Fault Localization Using Simulated and Real Users. Proceedings of the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME'20).
Horváth T, Gyimóthy T, Alexin Z, Kocsis F.  1993.  Interactive diagnosis and testing of logic programs. Third Finnish- Estonian- Hungarian Symposium on Programming Languages and Software Tools. :34-47.
Horváth T, Alexin Z, Gyimóthy T, Wrobel S.  1999.  Application of Different Learning Methods to Hungarian Part-of-Speech Tagging. Proceedings of the 9th International Workshop on Inductive Logic Programming. :128–139.
Horváth Z, Hodován R, Kiss Á.  2009.  Separating JavaScript Applications by Processes. Proceedings of the 11th Symposium on Programming Languages and Software Tools (SPLST'09) and 7th Nordic Workshop on Model Driven Software Engineering (NW-MODE'09). :189–194.
Horváth E, Forgács I, Kiss Á, Jász Judit, Gyimóthy T.  2005.  General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.
Horváth F, Gergely Tamás, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Horváth F, Beszédes Á, la Vancsics B, Balogh G, Vidács L, Gyimóthy T.  2022.  Using contextual knowledge in interactive fault localization. EMPIRICAL SOFTWARE ENGINEERING. 27
Horváth F, Lacerda VSchnepper, Beszédes Á, Vidács L, Gyimothy T.  2019.  A New Interactive Fault Localization Method with Context Aware User Feedback. Proceedings of the First International Workshop on Intelligent Bug Fixing (IBF 2019). :23-28.
J
Jász Judit, Beszédes Á, Gyimóthy T, Rajlich V.  2008.  Static Execute After/Before as a Replacement of Traditional Software Dependencies. Proceedings of the 2008 IEEE International Conference on Software Maintenance (ICSM'08). :137-146.
Jász J, Beszédes Á.  2018.  Software Testing Conferences and Women. Proceedings of the 2018 ACM/IEEE 1st International Workshop on Gender Equality in Software Engineering (GE'18). :17-20.
Jász Judit.  2008.  Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.
Jász Judit.  2008.  Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
Jász Judit, Schrettner L, Beszédes Á, Osztrogonác C, Gyimóthy T.  2012.  Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.
Jelasity M, Bilicki V, Kasza M.  2011.  Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.
Jelasity M, Bilicki V.  2009.  Towards automated detection of peer-to-peer botnets: On the limits of local approaches. LEET 09 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats Proceedings. :1-8.
Jelasity M, Bilicki V.  2009.  Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.