Abstracts |
Máté Cserép, Roderik Lindenbergh and Zoltán Vincellér |
A comparative study of distributed architectures for LiDAR-based change detection |
Andrea Huszti and Zita Kovács |
A provably secure mix-net |
Anna Soós and Judit Robu |
A Stochastic Model for Teaching Quality |
Győző Horváth |
A web-based programming environment for introductory programming courses in higher education |
Erika Ábrahám and Tudor Jebelean |
Adapting Cylindrical Algebraic Decomposition for Proof Specific Tasks |
Teréz Nemes, Ákos Dávid and Zoltán Süle |
Algorithmic calculation of reliability of computer network topologies |
Ákos Tóth and Roland Kunkli |
An automated method for creating cages for high definition 3D meshes |
Péter Gyimesi |
An open-source solution for automatic bug database creation |
Márton Ispány |
Analysis of time series of respiratory disease and air pollution data |
Attila Kuki |
Analyzing cluster networks by queueing systems |
Edit Pengő |
Applying Heurisctics to Improve our Java Symbolic Execution Engine |
Tuan Hai Nguyen and Tien V. Do |
Asynchronous working vacations in the M/M/2 queue |
Dorottya Papp and Norbert Pataki |
Bypassing Memory Leak in Modern C++ Realm |
Ábel Garai |
Cloud Service Architecture Optimization Methodology for Telemedicine and e-Health Interoperability |
Péter Szlávi, Gábor Törley and László Zsakó |
Cognitive Operations in Use |
Oktavian Abraham Lantang |
Collecting and Preprocessing Data Text in Social Media |
Kinga Kruppa, Roland Kunkli and Miklós Hoffmann |
Combining and extending the features of circle skinning algorithms |
András Béleczki and Zoltán Vincellér |
Comparing Predictive Analytics Libraries based on Historical Datasets |
Péter Bernát |
Comparison of problem-type oriented and instruction oriented methods of teaching programming through the use of Scratch programming language |
Péter Takács and Zoltán Ernő Csajbók |
Connection of flow graphs and contingency tables |
Viktória Zsók |
Coordinating Smart Distributed Systems |
Csaba Szugyiczki, Viktória Kurják, Gergely Kovásznai and Miklós Bán |
Cross-platform Mobile Development for Spatial Biological Databases |
Péter Hudoba |
Cryptography based on Erdős-Rényi random graphs |
Rastislav Žitný, Štefan Balla and Tibor Szabó |
Design Thinking and Digital Innovation Cooperative Project |
Gábor Horváth, Attila Páter-Részeg and Norbert Pataki |
Detecting Misusages of the C++ Standard Template Library |
László Kovács, Anita Agárdi and Bálint Debreceni |
Effiiency Analysis of Vertex Clustering in Solving the Travelling Salesman Problem |
Mohamed Amine Korteby and Zoltán Gál |
Energy consumption of Geographic Routing Mechanisms in Wireless Sensor Networks - a Survey |
Dhafer R. Zaghar, Dhulfiqar A Alwahab and Sándor Laki |
Enhancing the FIR Filter Design Using Neural Networks |
Katalin Szücs and Attila Kiss |
Event Detection on Call Data Records |
László Szathmáry |
Finding frequent closed itemsets with an extended version of the Eclat algorithm |
Zoltán Gál and György Terdik |
Fractal clustering and similarity measure methods for analysis of Wireless LAN controller efficiency |
Bence Számel and Géza Szabó |
Functional model of a decision support tool for Air Traffic Control supervisors |
Gábor Kusper |
Generate a 3-SAT Problem from a Directed Graph by Algorithm BalatonBoglár |
Gábor Valasek |
Generating Distance Fields from Parametric Plane Curves |
Zsuzsanna Szalayné Tahy |
Guess the Code of Conditional Summation |
Ferenc Nagy, Roland Kunkli and Miklós Hoffmann |
Improved algorithm to find isoptic surface for three-dimensional objects |
Tibor Dulai, Ágnes Werner-Stark and Gyula Ábrahám |
Improvement of resource allocation in workflows by stochastic method |
Ágnes Konkoly |
Innovative R tools supporting market survey quality |
Csaba Bálint and Gábor Valasek |
Interactive Rendering Framework for Distance Function Representations |
Tamás Bérczes, Ádám Tóth and Ramin Karimi |
Investigation of Hadoop System |
Attila Bagossy and Péter Battyányi |
Investigations in the realm of unconventional computing |
Krisztián Deák |
Manufacturing defect size estimation of tapered roller bearings from the vibration signal using discrete wavelet transform with Symlet wavelets and image processing |
Ildikó Papp and Marianna Zichar |
Modelling and printing in 3D at higher education |
Zoltán Illés, Viktória H. Bakonyi and Zoltán Jnr. Illés |
Modern environment inspired education |
Tibor Ásványi |
On the asymptotic properties of functions and programs |
Ede Mátyás Troll and Miklós Hoffmann |
On the caustic of the Bézier curve |
Zoltán Ernő Csajbók, Péter Takács and József Ködmön |
On the Implementation of Multiset Relations and Operations |
Hamza Nemouchi and János Sztrik |
Performance Evaluation of Finite-Source Cognitive Networks with Non-reliable Services Using Simulation |
Tibor Tajti |
Performance Evaluation of Neural Network Algorithm using Evolutionary Algorithm |
Gergely Nagy and Zoltán Porkoláb |
Performance Issues with Implicit Resolution in Scala |
Dávid Kolozsvári, Norbert Bátfai, Renátó Besenczi, Fanny Monori, Gergő Bogacsovics, Kristóf Fábián and Péter Jeszenszky |
Practical Robopsychology: Samu is Learning the Passengers of the RoboTaxis |
Fanny Monori, Norbert Bátfai, Renátó Besenczi, Dávid Kolozsvári, Gergő Bogacsovics, Kristóf Fábián, Péter Jeszenszky and Márton Ispány |
Practical Robopsychology: Samu is Learning the Traffic of the City |
Tibor Brunner and Zoltán Porkoláb |
Programming Language History: Experiences based on the Evolution of C++ |
Melinda Tóth and Dániel Lukács |
Recovering Erlang conditionals from BEAM bytecode |
Hellmuth Stachel |
Reflection in quadratic surfaces |
Ágnes Baran and Tamás Vertse |
Reflections of the resonant wave functions in cut-off potentials |
Attila Perecsényi and István Fazekas |
Scale-free properties of the weights in a random graph model |
Andrea Huszti and Norbert Oláh |
Securing cloud authentication |
Attila Nagy and Péter Keresztes |
Simulation Environment for Investigation Delay Insensitivity of Data Flow Structure Asynchronous Networks and Systems |
Sándor Király, Szilveszter Székely, Roland Király and Tamás Balla |
Some aspects of using RPC |
Dávid Kis and Norbert Pataki |
Source Code-based Steganography |
Gergely Kocsis |
Spreading models on moving agents |
Bence Babati, Gábor Horváth, Viktor Májer and Norbert Pataki |
Static Analysis Toolset with Clang |
István Károly Boda, Erzsébet Tóth, István Csont and László T. Nagy |
Supporting language learning in the three-dimensional model of the ancient Library of Alexandria |
Richárd Szalay, Zoltán Porkoláb and Dániel Krupp |
Symbol Clustering: Resolving ambiguous symbol references of large-scale C,C++ projects based on linkage information |
Tamás Krutki |
Symbolic computation with the sygnm computer algebra system |
György Papp and Roland Kunkli |
Table visualization with improved circular layout technique |
László Zsakó, Győző Horváth and László Gábor Menyhárt |
Teaching web in public education |
István Fazekas and Bettina Lívia Lukácsné Porvázsnyik |
The asymptotic behavior of a random graph model based on N-interactions |
Mohammed Fekhreddine Seridi and Sándor Laki |
Towards Programmable Data Planes |
Dániel Csubák, Tamás Vörös and Attila Kiss |
Transparent cloud service encryption |
Lőrinc Garai |
Use of statistical software for experimental design |
Zoltán Czirkos |
Using Generator Functions in Algorithmic Visualizations |
Attila Kuki |
Using Modeler for modeling computer networks |
Hajnalka Torma |
Using the Flipped Classroom Method in Primary Education Informatics Classes |
Gergely Buday |
Verifying Concurrent ML Programs |
László Aszalós and Dávid Nagy |
Visualization of tolerance relations |
Gábor Kusper |
Western Canon of Software Engineering Principles |
Artúr Poór |
When Desugaring Makes Your Code Sour -- Reducing The Number Of False Positives and Negatives With External Tool |