Publications

Found 76 results
Author Keyword [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Beszédes Á, Vidács L.  2016.  Academic and Industrial Software Testing Conferences: Survey and Synergies. Proceedings of the 9th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW'16); 11th Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC PART'16). :240-249.
Bunke H, Csirik J.  1993.  An algorithm for matching run-length coded strings. Computing. 50:297–314.
Gergely T, Balogh G, Horváth F, Vancsics B, Beszédes Á, Gyimóthy T.  2018.  Analysis of Static and Dynamic Test-to-code Traceability Information. Acta Cybernetica. 23:903-919.
Gergely T, Balogh G, Horváth F, Vancsics B, Beszédes Á, Gyimóthy T.  2018.  Analysis of Static and Dynamic Test-to-code Traceability Information. Acta Cybernetica. 23:903-919.
Tremel E, Birman K, Kleinberg R, Jelasity M.  2018.  Anonymous, Fault-Tolerant Distributed Queries for Smart Devices. ACM Trans. Cyber-Phys. Syst.. 3
Vidács L, Horváth F, Tengeri D, Beszédes Á.  2016.  Assessing the Test Suite of a Large System Based on Code Coverage, Efficiency and Uniqueness. Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, the First International Workshop on Validating Software Tests (VST'16). :13-16.
B
Tengeri D, Beszédes Á, Gergely T, Vidács L, Havas D, Gyimóthy T.  2015.  Beyond Code Coverage - an Approach for Test Suite Assessment and Improvement. Software Testing, Verification and Validation Workshops (ICSTW), TAIC-PART 2015, IEEE Eighth International Conference on. :1-7.
C
Gosztolya G, Busa-Fekete R.  2019.  Calibrating AdaBoost for Phoneme Classification. Soft Computing. 23:115–128.
Ferenc R, Hegedűs P, Gyimesi P, Antal G, Bán D, Gyimóthy T.  2019.  Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions. Proceedings of the 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering. :8–14.
Horvath F, Gergely T, Beszedes A, Tengeri D, Balogh G, Gyimothy T.  2019.  Code coverage differences of Java bytecode and source code instrumentation tools. SOFTWARE QUALITY JOURNAL. 27:79-123.
Horvath F, Gergely T, Beszedes A, Tengeri D, Balogh G, Gyimothy T.  2019.  Code coverage differences of Java bytecode and source code instrumentation tools. SOFTWARE QUALITY JOURNAL. 27:79-123.
Horváth F, Gergely T, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Horváth F, Gergely T, Beszédes Á, Tengeri D, Balogh G, Gyimóthy T.  2017.  Code Coverage Differences of Java Bytecode and Source Code Instrumentation Tools. Software Quality Journal.
Ferenc R., Beszédes A., Tarkiainen M, Gyimóthy T..  2002.  Columbus - Reverse engineering tool and schema for C++. Conference on Software Maintenance. :172–181.
Ferenc R, Magyar F, Beszédes Á, Kiss Á, Tarkiainen M.  2001.  Columbus – Tool for Reverse Engineering Large Object Oriented Software Systems. Proceedings of the 7th Symposium on Programming Languages and Software Tools (SPLST 2001). :16–27.
Vidács L, Beszédes Á, Gyimóthy T.  2009.  Combining preprocessor slicing with C/C++ language slicing. Science of Computer Programming. 74:399-413.
Kuba A., Bakota T, Hócza A., Oravecz C..  2003.  Comparing different postagging techniques for hungarian. Proceedings of the MSZNY 2003. :16-23.
Tóth G, Fülöp LJenő, Vidács L, Beszédes Á, Demeter H, Farkas L, Gyimóthy T.  2010.  Complex event processing synergies with predictive analytics.
D
Ferenc R., Beszedes A..  2002.  Data exchange with the columbus schema for c++. Proceedings of the Sixth European Conference on Software Maintenance and Reengineering. :59-66.
Berta Á, Jelasity M.  2017.  Decentralized management of random walks over a mobile phone network.. Proceedings of the 25th Euromicro Conference on Parallel, Distributed and Network-Based Processing. :100–107.
Blázsik Z., Holló C., Imreh B..  1998.  On Decision-mappings Related to Process Network Synthesis Problem. Acta Cybern.. 13:319–328.
Gergely T, Balogh G, Horvath F, Vancsics B, Beszedes A, Gyimothy T.  2019.  Differences between a static and a dynamic test-to-code traceability recovery method. SOFTWARE QUALITY JOURNAL. 27:797-822.
Gergely T, Balogh G, Horvath F, Vancsics B, Beszedes A, Gyimothy T.  2019.  Differences between a static and a dynamic test-to-code traceability recovery method. SOFTWARE QUALITY JOURNAL. 27:797-822.
Gosztolya G, Busa-Fekete R, Grósz T, Tóth L.  2017.  DNN-Based Feature Extraction and Classifier Combination for Child-Directed Speech, Cold and Snoring Identification. Proceedings of Interspeech. :3522–3526.
Jiang X., Abegglen K., Bunke H., Csirik J.  2003.  Dynamic computation of generalised median strings. Pattern Analysis & Applications. 6:185–193.

Pages