Publications
Found 82 results
Author Keyword Title [ Type![(Asc)](https://rgai.inf.u-szeged.hu/sites/rgai.inf.u-szeged.hu/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is F [Clear All Filters]
Full Matching and Isomorphism of Nucleotide Chains. INDIAN JOURNAL of PURE AND APPLIED MATHEMATICS. 31:243-263.
.
2000. .
2010. .
2010. .
1999. Various Robust Search Methods in a Hungarian Speech Recognition System. Acta Cybernetica. 16:229-240.
.
2003. Various Robust Search Methods in a Hungarian Speech Recognition System. Acta Cybernetica. 16:229–240.
.
2003. Two-Dimensional Rectangle Packing: On-Line Methods and Results. Discrete Applied Mathematics. 45:197–204.
.
1993. Survey of Code-size Reduction Methods. ACM Comput. Surv.. 35:223–267.
.
2003. Stability of Corner Points in Scale Space: The Effects of Small Nonrigid Deformations. Computer Vision and Image Understanding. 72:72–83.
.
1998. Stability of Corner Points in Scale Space: The Effect of Small Non-Rigid Deformations. Computer Vision and Image Understanding. 72:72–83.
.
1998. Self-Organizing Multi-Resolution Grid for Motion Planning and Control. Int. J. Neural Syst.. 7:757.
.
1996. Runtime Exception Detection in Java Programs Using Symbolic Execution. Acta Cybernetica. 21:331–352.
.
2014. Robust point correspondence applied to two- and three-dimensional image registration. IEEE Transactions on Pattern Analysis and Machine Intelligence. 23:165-179.
.
2001. Recognizing Design Patterns in C++ programs with the integration of Columbus and Maisa. Acta Cybernetica. 15:669-682.
.
2002. Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware. Journal of Supercomputing. :25.
.
2018. Prediction models for performance, power, and energy efficiency of software executed on heterogeneous hardware. JOURNAL OF SUPERCOMPUTING. 75:4001-4025.
.
2019. Performance comparison of query-based techniques for anti-pattern detection. Information and Software Technology. 65:147-165.
.
2015. Iso-surface extraction in nD applied to tracking feature curves across scale. Image Vision Comput.. 16:545–556.
.
1998. Handling pointers and unstructured statements in the forward computed dynamic slice algorithm. Acta Cybern.. 15:489–508.
.
2002. Generalized algorithmic debugging and testing. ACM Lett. Program. Lang. Syst.. 1:303–322.
.
1992. A Fully Three-Dimensional Method for Facial Reconstruction Based on Deformable Models. Journal of Forensic Sciences. 42:649-652.
.
1997. Empirical Study on Refactoring Large-scale Industrial Systems and Its Effects on Maintainability. Journal of Systems and Software. 129:107–126.
.
2017. Empirical evaluation of software maintainability based on a manually validated refactoring dataset. Information and Software Technology. 95:313-327.
.
2018. Deep-water framework: The Swiss army knife of humans working with machine learning models. SoftwareX. 12:100551.
.
2020. Connection Between Version Control Operations and Quality Change of the Source Code. {Acta Cybernetica}. 21:585–607.
.
2014.