1 |
Viktória Heizlerné Bakonyi László Zsakó |
Strategy of guessing exercises – Variations of drawing trees |
2 |
Kanita Karaduzovic-Hadziabdic Rasit Koker |
Diagnosis of Heart Disease Using a Committee Machine Neural Network |
3 |
Attila Piros |
A Different Approach to UDC in a Mechanized Retrieval System |
4 |
Roland Király |
Source Code Analysation and Optimalization - poster abstract |
5 |
Roland Király |
Results of metric based transformations |
6 |
Gábor Márton Zoltán Porkoláb |
C++ Compile Time Reflection |
7 |
Kris Aerts |
Upgrading the ICT curriculum of a multi- disciplinary degree evolving from practical orientation to university integration |
8 |
Gunter Weiss |
PLENARY TALK: Solving Algebraic Equations with Fibonacci Sequences |
9 |
Rafael Sendra Stephan Winkler |
Optimization of Coefficients of Lists of Polynomials by Evolutionary Algorithms |
10 |
Ruben Smeets Kris Aerts Nele Mentens Dave Singelée An Braeken Laurent Segers Abdellah Touhafi Kris Steenhaut Niccolo De Caro |
Cryptographic key management architecture for dynamic 6LowPan networks |
11 |
Tamás Kádek János Pánovics |
Extended Breadth-First Search Algorithm in Practice |
12 |
Péter Kasza Péter Ligeti |
Secure Data Sharing Over Peer-To-Peer And Friend-To-Friend Networks |
13 |
László Lefkovits Szidónia Lefkovits |
Gaussian Refinements on Gabor Filter based Patch Descriptor |
14 |
János Kormos Tamás Balogh |
A computational model of outguessing |
15 |
Gábor Oláh Melinda Tóth Tamás Kozsik |
Conditional types in core Erlang |
16 |
István Péntek |
New ways of managing large datasets |
17 |
Csaba Szabó Veronika Szabóová |
Are agile methods the software chaos? |
18 |
Veronika Szabóová Csaba Szabó |
Quo vadis, self-* software? |
19 |
Csaba Szabó Maroš Kotuľa Richard Petruš |
A closer look at software refactoring using symbolic execution |
20 |
László Szathmáry |
Finding minimal rare itemsets with an extended version of the Apriori algorithm |
21 |
Benedek Nagy Péter Battyányi Norbert Bátfai Tamás Herendi Zoltán Gál György Kovács |
New Textbooks on Parallel Architectures, Algorithms and Programming |
22 |
Nikoletta Ekker |
New Way to Use Information Technologies to Monitor Spatial Abilities |
23 |
István Boda Erzsébet Tóth Miklós Bényei István Csont |
A three-dimensional virtual library model of the ancient Library of Alexandria |
24 |
Tibor Radványi Csaba Biró Sándor Király Péter Szigetváry Péter Takács |
Attack against RFID transponders |
25 |
Tamás Szincsák Anikó Vágner |
Public transit schedule and route planner application for mobile devices |
26 |
Sándor Király Tibor Radványi Csaba Biró Péter Szigetváry Péter Takács |
Programming an RFID reader for getting data from different semi-passive sensor tags |
27 |
Máté Cserép Dániel Krupp |
Component visualization methods for large legacy software in C/C++ |
28 |
Máté Cserép Tibor Brunner |
Rule based graph visualization for software systems |
30 |
Csaba Biró Gábor Kusper Tibor Radványi Sándor Király Péter Szigetváry Péter Takács |
SAT Representation of Randomly Deployed Wireless Sensor Networks |
31 |
László Aszalós Mária Bakó Tamás Mihálydeák |
Email labeling by rough clustering |
32 |
András Bóta László Kovács Miklós Krész András Pluhár |
The community structure of word association graphs |
33 |
Máté Karácsony |
Modeling C preprocessor metaprograms using purely functional languages |
34 |
István Fazekas Bettina Porvázsnyik |
Scale-free property for degrees and weights in a preferential attachment random graph model |
35 |
Szilvia Béla Márta Szilvási-Nagy |
Approximation of B-Spline Curves and Surfaces Using Matrix Representation |
36 |
Tamás Herendi Petr Malakhaltsev |
VANETs overview, advanced traffic light control |
37 |
Dávid Angyal Anikó Vágner István Juhász Péter Tóth |
Oscillometric blood pressure measurement algorithm for microcontroller |
38 |
András London Tamás Németh András Pluhár Tibor Csendes |
A Local PageRank Algorithm for Evaluating the Importance of Scientific Articles |
39 |
Barnabás Králik |
Model checking cyber-physical workflows |
40 |
Róbert Vajda |
Exploration of Hermite Interpolation Polynomials with Mathematica |
41 |
Sándor Baran |
Statistical calibration of ensemble forecasts |
42 |
Péter Fésüs |
Mathematical approach of PSA level test during prostate cancer analysis |
43 |
László Gábor Menyhárt Zoltán Illés Viktória Heizlerné Bakonyi |
Birth of Mobile Academy |
44 |
Réka Racsko |
Opportunities for improving digital competences: expectations and findings on a national and international ground |
45 |
Bálint Molnár András Benczúr |
An Information System Modelling Framework |
46 |
Péter Szlávi Viktória Heizlerné Bakonyi |
Evaluation of programming languages from the viewpoint of education |
47 |
Péter Szlávi Viktória Heizlerné Bakonyi |
Evaluation of development environments from the viewpoint of education |
48 |
Gyöngyi Kocsisné Dr. Szilágyi Attila Kocsis |
A Special Localization Algorithm in Wireless Sensor Networks for Telemetry Application |
49 |
Gergely Kovásznai |
Restricted Quantification in Bit-Vector Problems |
50 |
Viktória Lakó |
Analysis of Algorithms and Data Modelling Tasks of the Final Exam in Hungary |
51 |
László Gonda |
Utilization of constrained spectral clustering for clustering of graph nodes containing record data |
52 |
Zsolt Bagoly Máté Varga János Végh |
Implementing reconfigurable operating system components in Nios II with custom instructions |
53 |
Mária Molnárné Nagy |
Discussion of Input-Output Data in the Computer Implementation of the PSA-level Test during the Analysis of Prostate Cancer |
54 |
Gergely Nagy Zoltán Porkoláb |
The effects of using exception handling on software complexity |
55 |
Attila Kuki |
Modeling computer networks by the help of OPNet tools |
56 |
Attila Kuki Béla Almási Tamás Bérczes |
Modeling a QoS classified communication environment with packet reordering feature |
57 |
János Folláth |
On Linear Recursion and Pseudorandom Measure |
58 |
József Békési Gábor Galambos András Kelemen Miklós Krész |
Parallelization of video compression with OpenMP and ffmpeg |
59 |
Attila Adamkó Tamás Kádek Lajos Kollár Márk Kósa Tamás Szincsák Anikó Vágner |
From university calendars to smart university administration |
60 |
Attila Adamkó Tamás Kádek Lajos Kollár Márk Kósa Tamás Szincsák Anikó Vágner |
Crowdsourcing-based evaluation of seminar exercises and test case development |
61 |
József Sütő Stefan Oniga Attila Buchman |
Real time activity and behaviour monitoring |
62 |
Imre Szücs Attila Kiss |
Quantitative analysis of Bitcoin exchange rate and transactional network properties |
63 |
Emil Molnár István Prok Jenő Szirmai |
Computer visualization of higher dimensional and non-Euclidean geometries |
64 |
Kris Aerts Nele Mentens |
poster: Using FP & Data Mining to Generate Constrained Hardware for Dedicated Algorithms |
65 |
Rita Fleiner Attila Györök |
Exposing metadata in BitTorrent as Linked Open Data |
66 |
Tamás Balla Zoltán Gál |
Overview of the Internet of Things Short Range Communication Technologies |
67 |
András Benczúr Gyula István Szabó |
Extended Relations Defined by Regular Expressions |
68 |
László Kovács |
Role of negative properties in knowledge modelling |
69 |
Szabolcs Szilágyi |
Multiway Switching Controller Design using FPGA |
70 |
Andrea Erzsébet Kiss Tibor Balla Piroska Bíró György Terdik |
Analysis and visualization for soccer game |
71 |
Istvan Póser |
Challenges in Test System Verification |
72 |
Dóra Nemoda Sándor Baran András Horányi |
Probabilisti temperature fore asting in Hungary |
73 |
Ágnes Baran György Terdik |
Estimation of the spectrum of a spherical random field based on covariances |
74 |
Tamás Bérczes Wolfgang Schreiner János Sztrik Gábor Kusper |
Using PRISM to model spectrum renting in mobile cellular networks |
75 |
Tibor Csendes István Bársony István Szalay |
Optimization in Surgical Operation Design |
76 |
Béla Almási György Terdik |
Comparing the Communication Mechanisms of Health State Monitoring BGM Devices |
77 |
László Gábor Menyhárt Gáborné Pap |
PFW as generator |
78 |
Gergely Dévai |
Lightweight Simulation of Programmable Memory Hierarchies |
79 |
Gábor Antal Ádám Zoltán Végh Vilmos Bilicki |
Developing JPA-based applications using HL7 and SNOMED CT standards with code generation |
80 |
Ádám Zoltán Végh Gábor Antal Vilmos Bilicki |
A methodology for measuring software development productivity using Eclipse IDE |
81 |
Róbert Vajda |
On Low Degree Optimal Lagrange Interpolation via Symbolic Computation |
82 |
Krisztián Deák Imre Kocsis Attila Vámosi |
Application of machine vision in manufacturing of bearings using ANN and SVM |
83 |
Seyed Majid Mousavi Gábor Fazekas |
Increasing QoS in SaaS for low internet speed connections in cloud |
84 |
Mohammadreza Azodinia Vahid Farrokhi Andras Hajdu |
Constant time median filtering of extra large images using Hadoop |
85 |
Márton Szikszai Zoltán Gál Ágnes Nagy György Terdik |
Stochastic modeling of wireless networks a case study |
86 |
Imre Varga Gergely Kocsis |
Novel model of social networks with tunable clustering coefficient |
87 |
Gergely Kocsis Imre Varga |
The effect of dynamic active-inactive agents on spreading phenomena |
88 |
Győző Horváth László Gábor Menyhárt |
Teaching introductory programming with JavaScript in higher education |
89 |
Tamás Matuszka Attila Kiss |
Applicability Investigation of Augmented Reality-based Softwares |
90 |
Gergő Gombos Zoltán Vincellér Attila Kiss |
Virtual Observatory for twitter messages |
91 |
Marcell Fekete Zoltán Vincellér Zoltán Ács |
A new aspect of congestion detection over a large amount of real-time information |
92 |
Gábor Pótári Zoltán Vincellér Zoltán Ács |
A method for real-time adaptation of weather conditions within a traffic simulation |
93 |
László Szatmári |
Creating heuristics with machine learning |
94 |
Árpád Nyilas Zoltán Vincellér Zoltán Ács |
Estimation of OD matrices with naive Bayes method |
95 |
Tamás Herendi Roland Major |
Random number generation on FPGA-s |
96 |
Roland Sipos |
Study of NoSQL Technologies for the CMS Conditions Data |
97 |
Sándor Czirbusz |
Solving Special Functional Equations with CAS |
98 |
Péter Jeszenszky |
Video-based course material for teaching Data Mining |
99 |
Roland Sipos |
The GAIA methodology - A case study based on the NEXT-TELL project |
100 |
Viktor Fehér Győző Horváth |
The challenges of teaching informatics for visually impaired people in secondary education |
101 |
László Vörös |
Helical Structure of Space-filling Mosaics Based on 3D Models of the 5D and 6D Cubes |
102 |
Péter Fésüs |
Discussion of mathematical approach of PSA level test during prostate cancer analysis |
103 |
Tamás Kádek Márk Kósa János Pánovics |
Some Statistical Aspects of Programming Contests Managed by ProgCont |
104 |
Tamás Kádek Tamás Mihálydeák |
Some Unexpected Properties of Partial Propositional Logic Based on Partial Approximation Space |
105 |
Máté Varga Zsolt Bagoly János Végh |
Implementing SoCs with reconfigurable technology |
106 |
János Balogh József Békési |
Driver scheduling for vehicle schedules using a set covering approach: a case study |
107 |
Balázs Kreith |
Building scalable distributed network systems using a modified pipeline design pattern |
108 |
Adrián Csiszárik András Lukács |
Enhancement of Privacy-Preserving $-means |
109 |
Virág Varga Zoltán Porkoláb |
Improving Code Quality in PLC Programming |
110 |
Pál Dömösi Géza Horváth |
Key optimization for automata network based cryptosystems |
111 |
István Fazekas Sándor Pecsora |
A generalization of the Barabási-Albert random tree |
112 |
Attila Góbi Artyom Antyipin Tamás Kozsik |
Tree Traversal with Conditional Move |
113 |
Péter Battyányi György Vaszil |
Membrane Systems and Their Relation to the Chemical Programming Paradigm |
114 |
Andrea Huszti |
Anonymous Multi-Vendor Micropayment Scheme based on Bilinear Maps |
115 |
Áron Baráth Zoltán Porkoláb |
Domain-Specific Languages with Custom Operators |
116 |
Andrea Huszti Zita Kovács |
A Hybrid Mix based on Bilinear Maps |
117 |
Tibor Ásványi |
On Transformations of Ordered Lists |
118 |
Bence Bakondi Péter Burcsi Péter Györgyi Dávid Herskovics Péter Ligeti Dániel A. Nagy Viktória Villányi |
Secure P2P cloud storage with a reputation point scheme and sharing |
119 |
Mária Molnárné Nagy |
USABILITY OF MATHEMATICAL SOFTWARES IN PROSTATE SCREENING |
120 |
Anna Soos Judit Robu |
Application of Fixed Point Theorem in Probabilistic Metric space to Quicksort Algorithm |
121 |
Tamás Tóthfalusi Péter Orosz |
Line-rate Packet Processing in Hardware: the Evolution Towards 400 Gbit/s |
122 |
Gábor Horváth Norbert Pataki |
Clang Matchers for Verified Usage of the C++ Standard Template Libary |
123 |
Viktor Májer Norbert Pataki |
Concurrent Object Construction in Modern Object-oriented Programming Languages |
124 |
Zoltán Ernő Csajbók Tamás Mihálydeák |
General set approximation and its logical applications |
125 |
László Mérai Arne Winterhof |
On linear complexity profile of Edwards curve congruential generators |
126 |
Péter Orosz Tamás Skopkó Pál Varga |
A Three-Component Video Quality Assessment Method for Real-Time HD Video Transmission |
127 |
János Végh Zsolt Bagoly Péter Molnár |
Towards (even more) hybrid processors using reconfigurable technology |
128 |
Gábor Rácz Zoltán Pusztai Balázs Kósa Attila Kiss |
An Improved Community-based Greedy Algorithm for Solving the Influence Maximization Problem in Social Networks |
129 |
Péter Orosz Tamás Skopkó Zoltán Nagy |
Transport Protocol Trade-offs for Reconfigurable Architectures |
130 |
Laszlo Kazup Zsolt Bagoly Ádám Kicsák János Végh |
How to let cooperate the Neumann-world with reconfigurable world |
131 |
Melinda Simon |
Checking property based component-compatibility |
132 |
Péter Molnár János Végh |
Measuring operating systems performance parameters in reconfigurable systems using MicroC/OS-II |
133 |
János Abonyi |
Data- & process mining algorithms for the support of early warning systems |
134 |
Balázs Pinczel Balázs Kósa Attila Kiss |
Simulating a fragment of SPARQL with structural recursions |
135 |
Péter Orosz Zoltán Nagy |
Estimation of Media QoE without Reference |
136 |
András Király Péter Koncz János Abonyi |
Monte Carlo Simulation based Interactive Balance Scorecard of Business Processes |
137 |
Attila Balaton Zoltán Vincellér Gábor Vigh |
Detecting malfunctioning wireless sensors with group testing algorithms |
138 |
Ádám Kicsák János Végh Zsolt Bagoly |
Improving efficiency of operating systems through reconfigurable technology |
139 |
Csilla Prantner |
Conception of the educational portal |
140 |
Csaba Komló |
SDSA Lecture Streaming and Recording in Higher Education |
141 |
Gyöngyi Bujdosó |
From bookshelves via virtual shelves to ruza breto, our private online library – an outline of an intelligent personal repository system |
142 |
György Terdik |
The use and analysis of player performance index |
143 |
Zoltán Gál Tibor Tajti György Terdik |
Surprise Event Detection of the Supercomputer Execution Queues |
144 |
Gábor Alex Ispánovics Zoltán Porkoláb |
Binary Compatibility of C++ Programs |
145 |
Csaba Biró Gábor Kusper |
Design of a Parallel Look-ahead SAT Solver using Strategy Set |
146 |
Tamás Szakács Zoltán Ruzsa Zsolt Parisek Roland Király |
Framework for mathematics-based localization |
147 |
Viktória Zsók |
A Functional Prototype for CPS Systems |
148 |
Géza Csima |
On the isoptic hypersurfaces in the n-dimensional Euclidean space |
149 |
Marianna Zichar |
Optimized design of customized KML files |
150 |
Dániel Balla Marianna Zichar |
Geovisualization of Domestic Nature Conservation Areas using KML |
151 |
Viktor Árgilán János Balogh Attila Tóth |
On the Basic Vehicle Scheduling Problem |
152 |
Ildikó Papp Roland Kunkli Miklós Hoffmann |
Optimization of Skinning of Circles |
154 |
Péter Englert Márton Balassi Balázs Kósa Attila Kiss |
Efficiency Issues of Computing Graph Properties of Social Networks |
155 |
Péter Rónaszéki Gábor Kusper |
Parallel Graph Searching Algorithm on the GPU using OpenCL |
156 |
Tudor Jebelean |
Proof Techniques for the Synthesis of Sorting Algorithms |
157 |
Ákos Tóth Richard Zsolt Buda Gábor Boldizsár Roland Kunkli |
Kinect based 3D human face reconstruction for MPEG-4 based animation |
158 |
Tamás Cséri Gábor Horváth Zalán Szűgyi |
Examining test coverage of C++ template metaprograms |
159 |
Tibor Tajti Gábor Geda András Perjési Péter Magyar Tamás Balla Attila Szívós Tamás Gregus |
Indoor localization using NFC and mobile sensor data corrected using neural net |
160 |
Zoltán Istenes |
Choosing the right computing platform for robotics |
161 |
Tibor Juhász |
Lie derived length of group algebras of characteristic 2 |
162 |
Péter Magyar Gábor Geda Tibor Tajti András Perjési Tamás Gregus |
Business Oriented Creature Identification |
163 |
Dávid Juhász Barnabás Králik Attila Góbi László Domoszlai |
Workflow-based Cyber-Physical Programming: A Case Study |
164 |
Béla Rima József Vásárhelyi János Végh |
A new algorithm for using Mojette transform in image processing applications |
165 |
József Bánlaki |
UHF RFID with user interface (UI-TAG) |
166 |
Péter Takács Tamás Mihálydeák Zoltán Csajbók |
Boundaries of membranes in P systems relying on multiset approximation spaces in language R |
167 |
Balázs Lévai |
Automatic Failure Detection and Monitoring of Ventilation and Cooling Systems |
168 |
Márk Jelasity |
PLENARY TALK: Towards an open data ecosystem without clouds |
169 |
Vaclav Matyas |
PLENARY TALK: On design of privacy mechanisms for wireless sensor networks with intrusion detection |
170 |
Alois Ferscha |
PLENARY TALK: Why the Symbiosis of Society and Technology is a Complex Matter |
171 |
James Davenport |
PLENARY TALK: Formulating Problems in Real Algebra/Geometry |
172 |
Tamás Varga Róbert Schulcz |
Relay attacks on HF RFID and NFC communications and defense against them |
173 |
Attila Kovács Kristóf Szabados |
Advanced TTCN-3 Test Suite validation with Titan |