Publications
Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.
.
2014. Scalable Stealth Mode P2P Overlays of Very Small Constant Degree. ACM Transactions on Autonomous and Adaptive Systems. 6:1-27.
.
2011. A Set of Successive Job Allocation Models in Distributed Computing Infrastructures. Journal of Grid Computing. 14:347-358.
.
2016. Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003). Journal of Software Maintenance and Evolution: Research and Practice. 16:217–218.
.
2004. SIP compression. Periodica Polytechnica-Electrical Engineering. 47:1-2.
.
2003. A sírban is szem előtt. Népszabadság.
.
2008. Slicing of Constraint Logic Programs. Linköping Electronic Articles in Computer and Information Science. 3:1-27.
.
1998. Smartphone-based data collection with stunner, the reality of peer-to-peer connectivity and web real-time communications using crowdsourcing: lessons learnt while cleaning the data. International Journal On Advances in Software. 11(1-2):120-130.
.
2018. The software developers' view on product metrics - A survey-based experiment. Annales Mathematicae et Informaticae. 37:225–240.
.
2010. Software generation based on attribute grammars. Periodica Polytechnica. 35:147-152.
.
1991. Static and Dynamic Slicing of Constraint Logic Programs. Automated Software Engg.. 9:41–65.
.
2002. Static Execute After Algorithms as Alternatives for Impact Analysis. Periodica Polytechnica Elec. Eng.. 52:163-176.
.
2008. Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems. Lecture Notes in Computer Science. vol 11534(Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019)
.
2019. A survey and taxonomy of simulation environments modelling fog computing. Simulation Modelling Practice and Theory. 101
.
2020. Survey of Code-Size Reduction Methods. ACM Computing Surveys. 35:223-267.
.
2003. A Survey on Blockchain-Fog Integration Approaches. IEEE Access. 8:102657-102668.
.
2020. A Survey on Service Quality Description. ACM COMPUTING SURVEYS. 46:1–58.
.
2013. Syntactic pattern recognition in the HLP/PAS system. Acta Cybern.. 8:79–88.
.
1987. Syntactic pattern recognition with modified fuzzy automata. Computational Linguistics and Computer Langugaes. 15:175-193.
.
1982. Szűrővizsgálatok név nélkül. Magyar Hírlap.
.
2006. A szektoriális adatvédelmi jog áttekintése. Infokommunikáció és Jog. 42:28-29.
.
2011. .
2012. .
2013. Személyiségvédelem az orvosi kutatásban. Lege Artis Medicinae. 16:594-597.
.
2006. .
2021.