List of papers
Volume 1
Plenary talks
- Gunter Weiss:
Solving algebraic equations with Fibonacci sequences
(Volume 1. pp. 9-18)
doi: 10.14794/ICAI.9.2014.1.9
Artificial intelligence
- László Aszalós, Mária Bakó, Tamás Mihálydeák:
Email labelling by rough clustering
(Volume 1. pp. 19-26)
doi: 10.14794/ICAI.9.2014.1.19 - Balázs Bánhelyi, Balázs L. Lévai:
Automatic failure detection and monitoring of ventilation and cooling systems
(Volume 1. pp. 27-32)
doi: 10.14794/ICAI.9.2014.1.27 - Zoltán Ernő Csajbók, Tamás Mihálydeák:
General set approximation and its logical applications
(Volume 1. pp. 33-40)
doi: 10.14794/ICAI.9.2014.1.33 - Marcell Fekete, Zoltán Vincellér, Zoltán Ács:
A new aspect of congestion detection over a large amount of real-time information
(Volume 1. pp. 41-50)
doi: 10.14794/ICAI.9.2014.1.41 - Tamás Kádek, Tamás Mihálydeák:
Some unexpected properties of partial propositional logic based on partial approximation space
(Volume 1. pp. 51-58)
doi: 10.14794/ICAI.9.2014.1.51 - Tamás Kádek, János Pánovics:
Extended breadth-first search algorithm in practice
(Volume 1. pp. 59-66)
doi: 10.14794/ICAI.9.2014.1.59 - László Kovács:
Role of negative properties in knowledge modeling
(Volume 1. pp. 67-74)
doi: 10.14794/ICAI.9.2014.1.67 - László Lefkovits, Szidónia Lefkovits:
Gaussian refinements on Gabor filter based patch descriptor
(Volume 1. pp. 75-84)
doi: 10.14794/ICAI.9.2014.1.75 - László Szathmáry:
Finding minimal rare itemsets with an extended version of the Apriori algorithm
(Volume 1. pp. 85-92)
doi: 10.14794/ICAI.9.2014.1.85
Computer aided geometric modeling and computer graphics
- Mohammadreza Azodinia, Vahid Farrokhi, Andras Hajdu:
Constant time median filtering of extra large images using Hadoop
(Volume 1. pp. 93-101)
doi: 10.14794/ICAI.9.2014.1.93 - István Boda, Erzsébet Tóth, Miklós Bényei, István Csont:
A three-dimensional virtual library model of the ancient Library of Alexandria
(Volume 1. pp. 103-111)
doi: 10.14794/ICAI.9.2014.1.103 - András Bóta, László Kovács:
The community structure of word association graphs
(Volume 1. pp. 113-120)
doi: 10.14794/ICAI.9.2014.1.113 - Tibor Brunner, Máté Cserép:
Rule based graph visualization for software systems
(Volume 1. pp. 121-130)
doi: 10.14794/ICAI.9.2014.1.121 - Roland Sipos:
The GAIA methodology - A case study based on the NEXT-TELL project
(Volume 1. pp. 131-140)
doi: 10.14794/ICAI.9.2014.1.131 - László Vörös:
Helical structure of space-filling mosaics based on 3D models of the 5D and 6D cubes
(Volume 1. pp. 141-149)
doi: 10.14794/ICAI.9.2014.1.141
Computer statistics
- Árpád Nyilas, Zoltán Ács, Zoltán Vincellér:
Estimation of OD matrices with naive Bayes method
(Volume 1. pp. 151-159)
doi: 10.14794/ICAI.9.2014.1.151 - Istvan Poser:
Challenges in test system verification
(Volume 1. pp. 161-169)
doi: 10.14794/ICAI.9.2014.1.161
Data base systems
- Rita Fleiner, Attila Györök:
Exposing metadata in BitTorrent as Linked Open Data
(Volume 1. pp. 171-180)
doi: 10.14794/ICAI.9.2014.1.171 - Gergő Gombos, Zoltán Vincellér, Attila Kiss:
Virtual observatory for twitter messages
(Volume 1. pp. 181-187)
doi: 10.14794/ICAI.9.2014.1.181 - László Kazup, János Végh, Ádám Kicsák, Zsolt Bagoly:
Possibilities of using reconfigurable devices for improving computational efficiency
(Volume 1. pp. 189-194)
doi: 10.14794/ICAI.9.2014.1.189 - Seyed Majid Mousavi, Gábor Fazekas:
Increasing QoS in SaaS for low Internet speed connections in cloud
(Volume 1. pp. 195-200)
doi: 10.14794/ICAI.9.2014.1.195 - Imre Szücs, Attila Kiss:
Quantitative analysis of Bitcoin exchange rate and transactional network properties
(Volume 1. pp. 201-211)
doi: 10.14794/ICAI.9.2014.1.201
Data security and cryptography
- B. Bakondi, P. Burcsi, P. Györgyi, D. Herskovics, P. Ligeti, L. Mérai, D. A. Nagy, V. Villányi:
A P2P based storage system with reputation points and simulation results
(Volume 1. pp. 213-217)
doi: 10.14794/ICAI.9.2014.1.213 - Ruben Smeets, Kris Aerts, Nele Mentens, Dave Singelee, An Braeken, Laurent Segers, Abdellah Touhafi, Kris Steenhaut, Niccolo De Caro:
A cryptographic key management architecture for dynamic 6LowPan networks
(Volume 1. pp. 219-229)
doi: 10.14794/ICAI.9.2014.1.219
Distributed and parallel computing
- András Kelemen, József Békési, Gábor Galambos, Miklós Krész:
Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment
(Volume 1. pp. 231-237)
doi: 10.14794/ICAI.9.2014.1.231 - Benedek Nagy, Péter Battyányi, Norbert Bátfai, Zoltán Gál, Tamás Herendi, György Kovács:
New textbooks on parallel architectures, algorithms and programming
(Volume 1. pp. 239-249)
doi: 10.14794/ICAI.9.2014.1.239 - Attila Kuki:
Modeling computer networks by the help of OPNet tools
(Volume 1. pp. 251-258)
doi: 10.14794/ICAI.9.2014.1.251 - Tamás Tóthfalusi, Péter Orosz:
Line-rate packet processing in hardware: the evolution towards 400 Gbit/s
(Volume 1. pp. 259-268)
doi: 10.14794/ICAI.9.2014.1.259
Education and other fields of applied informatics
- Kris Aerts:
Upgrading the ICT curriculum of a multidisciplinary degree evolving from practical orientation to university integration
(Volume 1. pp. 269-278)
doi: 10.14794/ICAI.9.2014.1.269 - Béla Almási:
Comparing the Communication Mechanisms of Health State Monitoring BGM Devices
(Volume 1. pp. 279-284)
doi: 10.14794/ICAI.9.2014.1.279 - Viktória Heizlerné Bakonyi, László Zsakó:
Strategy of guessing exercises – Variations of drawing trees
(Volume 1. pp. 285-294)
doi: 10.14794/ICAI.9.2014.1.285 - Krisztián Deák, Imre Kocsis, Attila Vámosi:
Application of machine vision in manufacturing of bearings using ANN and SVM
(Volume 1. pp. 295-304)
doi: 10.14794/ICAI.9.2014.1.295 - Peter Fesus:
Mathematical approach of PSA level test during prostate cancer analysis
(Volume 1. pp. 305-312)
doi: 10.14794/ICAI.9.2014.1.305 - Tamás Herendi, Roland Major:
Efficient random number generation on FPGA-s
(Volume 1. pp. 313-320)
doi: 10.14794/ICAI.9.2014.1.313 - Tamás Herendi, Petr Malakhaltsev:
VANETs overview, advanced traffic light control
(Volume 1. pp. 321-328)
doi: 10.14794/ICAI.9.2014.1.321 - József Holovács, Gábor Kusper:
Information as mapping
(Volume 1. pp. 329-337)
doi: 10.14794/ICAI.9.2014.1.329 - Győző Horváth, László Menyhárt:
Teaching introductory programming with JavaScript in higher education
(Volume 1. pp. 339-350)
doi: 10.14794/ICAI.9.2014.1.339 - Kanita Karaduzovic-Hadziabdic, Raşit Köker:
Diagnosis of heart disease using a committee machine neural network
(Volume 1. pp. 351-360)
doi: 10.14794/ICAI.9.2014.1.351 - Viktória Lakó:
Analysis of algorithms and data modelling tasks of the final exam in Hungary
(Volume 1. pp. 361-368)
doi: 10.14794/ICAI.9.2014.1.361
Volume 2
Education and other fields of applied informatics
- László Menyhárt, Gáborné dr. Pap:
PFW as generator
(Volume 2. pp. 9-16)
doi: 10.14794/ICAI.9.2014.2.9 - Alexandr Mitsa, József Holovács, Vasil Petcko:
Optimization of structure of the wide band interference filters
(Volume 2. pp. 17-21)
doi: 10.14794/ICAI.9.2014.2.17 - Mária Molnárné Nagy:
Discussion of input-output data in the computer implementation of the PSA-level test during the analysis of prostate cancer
(Volume 2. pp. 23-27)
doi: 10.14794/ICAI.9.2014.2.23 - Attila Piros:
A different approach to Universal Decimal Classification in a Mechanized Retrieval System
(Volume 2. pp. 29-39)
doi: 10.14794/ICAI.9.2014.2.29 - Gábor Pótári, Zoltán Vincellér, Zoltán Ács:
A method for real-time adaptation of weather conditions within a traffic simulation
(Volume 2. pp. 41-47)
doi: 10.14794/ICAI.9.2014.2.41 - Judit Robu, Anna Soós:
Application of fixed point theorem in probabilistic metric space to quicksort algorithm
(Volume 2. pp. 49-55)
doi: 10.14794/ICAI.9.2014.2.49 - Szabolcs Szilágyi:
Multiway switching controller design using FPGA
(Volume 2. pp. 57-63)
doi: 10.14794/ICAI.9.2014.2.57 - Péter Szlávi, Viktória Heizlerné Bakonyi:
Evaluation of programming languages from educational perspective
(Volume 2. pp. 65-74)
doi: 10.14794/ICAI.9.2014.2.65 - Péter Szlávi, Viktória Heizlerné Bakonyi:
Evaluation of development environments from educational perspective
(Volume 2. pp. 75-84)
doi: 10.14794/ICAI.9.2014.2.75
Functional programming
- Máté Karácsony:
Modeling C preprocessor metaprograms using purely functional languages
(Volume 2. pp. 85-92)
doi: 10.14794/ICAI.9.2014.2.85
Future internet
- Tamas Balla, Zoltan Gal:
Overview of the Internet of Things Short Range Communication Technologies
(Volume 2. pp. 93-100)
doi: 10.14794/ICAI.9.2014.2.93 - Csaba Biró, Gábor Kusper, Tibor Radványi, Sándor Király, Péter Szigetváry, Péter Takács:
SAT representation of randomly deployed Wireless Sensor Networks
(Volume 2. pp. 101-111)
doi: 10.14794/ICAI.9.2014.2.101 - Péter Englert, Márton Balassi, Balázs Kósa, Attila Kiss:
Efficiency issues of computing graph properties of social networks
(Volume 2. pp. 113-120)
doi: 10.14794/ICAI.9.2014.2.113 - László Gonda:
Utilization of constrained spectral clustering for clustering of graph nodes containing record data
(Volume 2. pp. 121-130)
doi: 10.14794/ICAI.9.2014.2.121 - Sándor Király, Tibor Radványi, Csaba Biró, Péter Szigetváry, Péter Takács:
Programming an RFID reader for getting data from different semi-passive sensor tags
(Volume 2. pp. 131-138)
doi: 10.14794/ICAI.9.2014.2.131 - Gergely Kocsis, Imre Varga:
The effect of dynamic active-inactive agents on spreading phenomena
(Volume 2. pp. 139-144)
doi: 10.14794/ICAI.9.2014.2.139 - Péter Orosz, Zoltán Nagy:
Estimation of Media QoE without reference
(Volume 2. pp. 145-152)
doi: 10.14794/ICAI.9.2014.2.145 - Tamás Szincsák, Anikó Vágner:
Public transit schedule and route planner application for mobile devices
(Volume 2. pp. 153-161)
doi: 10.14794/ICAI.9.2014.2.153 - Tibor Tajti, Gábor Geda, Tamás Balla, Gyula Vad:
Indoor localization using NFC and mobile sensor data corrected using neural net
(Volume 2. pp. 163-169)
doi: 10.14794/ICAI.9.2014.2.163 - Imre Varga, Gergely Kocsis:
Novel model of social networks with tunable clustering coefficient
(Volume 2. pp. 171-176)
doi: 10.14794/ICAI.9.2014.2.171 - Tamás Varga, Róbert Schulcz:
Relay attacks on HF RFID and NFC communications and defence against them
(Volume 2. pp. 177-184)
doi: 10.14794/ICAI.9.2014.2.177
Future internet and computer graphics
- Dániel Balla, Marianna Zichar:
Geovisualization of domestic nature conservation areas using KML
(Volume 2. pp. 185-193)
doi: 10.14794/ICAI.9.2014.2.185 - Zoltán Gál, Ágnes Nagy, Márton Szikszai, György Terdik:
Stochastic modeling of Wireless Networks: A case study in time domain
(Volume 2. pp. 195-201)
doi: 10.14794/ICAI.9.2014.2.195 - Marianna Zichar:
Optimized design of customized KML files
(Volume 2. pp. 203-208)
doi: 10.14794/ICAI.9.2014.2.203
Operational research
- Viktor S. Árgilán, János Balogh, Attila Tóth:
The basic problem of vehicle scheduling can be solved by maximum bipartite matching
(Volume 2. pp. 209-218)
doi: 10.14794/ICAI.9.2014.2.209 - János Balogh, József Békési:
Driver scheduling for vehicle schedules using a set covering approach: a case study
(Volume 2. pp. 219-229)
doi: 10.14794/ICAI.9.2014.2.219 - Tamás László Balogh, János Kormos:
Why do they always win?
(Volume 2. pp. 231-243)
doi: 10.14794/ICAI.9.2014.2.231 - Tibor Csendes, István Bársony, István Szalay:
Optimization in Surgical Operation Design
(Volume 2. pp. 245-253)
doi: 10.14794/ICAI.9.2014.2.245
Software design and object oriented programming
- Gábor Antal, Ádám Zoltán Végh, Vilmos Bilicki:
A methodology for measuring software development productivity using Eclipse IDE
(Volume 2. pp. 255-262)
doi: 10.14794/ICAI.9.2014.2.255 - Áron Baráth, Zoltán Porkoláb:
Domain-specific languages with custom operators
(Volume 2. pp. 263-271)
doi: 10.14794/ICAI.9.2014.2.263 - Attila Kovács, Kristóf Szabados:
Advanced TTCN-3 Test Suite validation with Titan
(Volume 2. pp. 273-281)
doi: 10.14794/ICAI.9.2014.2.273 - Balázs Kreith:
Building scalable distributed network systems using a modified pipeline design pattern
(Volume 2. pp. 283-292)
doi: 10.14794/ICAI.9.2014.2.283 - Viktor Májer, Norbert Pataki:
Concurrent object construction in modern object-oriented programming languages
(Volume 2. pp. 293-300)
doi: 10.14794/ICAI.9.2014.2.293 - László Menyhárt, Zoltán Illés, Viktória Heizlerné Bakonyi:
Birth of Mobile Academy
(Volume 2. pp. 301-307)
doi: 10.14794/ICAI.9.2014.2.301 - Csaba Szabó, Maroš Kotul, Richard Petruš:
A closer look at software refactoring using symbolic execution
(Volume 2. pp. 309-316)
doi: 10.14794/ICAI.9.2014.2.309 - Veronika Szabóová, Csaba Szabó:
Quo vadis, self-* software?
(Volume 2. pp. 317-325)
doi: 10.14794/ICAI.9.2014.2.317
Posters
- Nikoletta Ekker:
New way to use information technologies to monitor spatial abilities
(Volume 2. pp. 327-327)
doi: 10.14794/ICAI.9.2014.2.327 - Tamás Gregus, András Perjési, Attila Szívós, Tibor Tajti, Péter Magyar, Gábor Geda:
MAPPING: Exploration and identification of surrounding objects near Eszterhazy Karoly University of Applied Sciences
(Volume 2. pp. 329-336)
doi: 10.14794/ICAI.9.2014.2.329 - Roland Király:
Results of metric based transformations
(Volume 2. pp. 337-338)
doi: 10.14794/ICAI.9.2014.2.337 - Roland Király:
Source code analysation and optimalization
(Volume 2. pp. 339-340)
doi: 10.14794/ICAI.9.2014.2.339 - Mária Molnárné Nagy:
Usability of mathematical softwares in prostate screening
(Volume 2. pp. 341-342)
doi: 10.14794/ICAI.9.2014.2.341 - Csilla Kvaszingerné Prantner:
Conception of the educational portal
(Volume 2. pp. 343-349)
doi: 10.14794/ICAI.9.2014.2.343 - Reka Racsko:
Opportunities for improving digital competences: expectations and findings on a national and international ground
(Volume 2. pp. 351-357)
doi: 10.14794/ICAI.9.2014.2.351 - Roland Sipos:
Study of NoSQL technologies for the CMS Conditions Data
(Volume 2. pp. 359-361)
doi: 10.14794/ICAI.9.2014.2.359 - Attila Vámosi:
Applying the SVM method in an engineering optimization problem
(Volume 2. pp. 363-364)
doi: 10.14794/ICAI.9.2014.2.363