Search Results - "Gyimóthy, Tibor"

Refine Results
  1. 1

    A public unified bug dataset for java and its assessment regarding metrics and bug prediction by Ferenc, Rudolf, Tóth, Zoltán, Ladányi, Gergely, Siket, István, Gyimóthy, Tibor

    Published in Software quality journal (01-12-2020)
    “…Bug datasets have been created and used by many researchers to build and validate novel bug prediction models. In this work, our aim is to collect existing…”
    Get full text
    Journal Article
  2. 2

    An automatically created novel bug dataset and its validation in bug prediction by Ferenc, Rudolf, Gyimesi, Péter, Gyimesi, Gábor, Tóth, Zoltán, Gyimóthy, Tibor

    Published in The Journal of systems and software (01-11-2020)
    “…Bugs are inescapable during software development due to frequent code changes, tight deadlines, etc.; therefore, it is important to have tools to find these…”
    Get full text
    Journal Article
  3. 3

    Using information retrieval based coupling measures for impact analysis by Poshyvanyk, Denys, Marcus, Andrian, Ferenc, Rudolf, Gyimóthy, Tibor

    “…Coupling is an important property of software systems, which directly impacts program comprehension. In addition, the strength of coupling measured between…”
    Get full text
    Journal Article
  4. 4

    Empirical evaluation of software maintainability based on a manually validated refactoring dataset by Hegedűs, Péter, Kádár, István, Ferenc, Rudolf, Gyimóthy, Tibor

    Published in Information and software technology (01-03-2018)
    “…•We provided a manually validated refactoring dataset containing only true positive refactorings.•The maintainability of refactored elements (classes and…”
    Get full text
    Journal Article
  5. 5

    Empirical study on refactoring large-scale industrial systems and its effects on maintainability by Szőke, Gábor, Antal, Gábor, Nagy, Csaba, Ferenc, Rudolf, Gyimóthy, Tibor

    Published in The Journal of systems and software (01-07-2017)
    “…•We examine hundreds of manual refactoring commits from large-scale industrial systems.•We study the effects of these commits on source code using a…”
    Get full text
    Journal Article
  6. 6

    Using contextual knowledge in interactive fault localization by Horváth, Ferenc, Beszédes, Árpád, Vancsics, Béla, Balogh, Gergő, Vidács, László, Gyimóthy, Tibor

    “…Tool support for automated fault localization in program debugging is limited because state-of-the-art algorithms often fail to provide efficient help to the…”
    Get full text
    Journal Article
  7. 7

    Feature analysis using information retrieval, community detection and structural analysis methods in product line adoption by Kicsi, András, Csuvik, Viktor, Vidács, László, Horváth, Ferenc, Beszédes, Árpád, Gyimóthy, Tibor, Kocsis, Ferenc

    Published in The Journal of systems and software (01-09-2019)
    “…•Clone-and-own is a usual approach in industry to handle requirements of new customers.•Domain experts and developers work together in adopting the product…”
    Get full text
    Journal Article
  8. 8

    Deep learning in static, metric-based bug prediction by Ferenc, Rudolf, Bán, Dénes, Grósz, Tamás, Gyimóthy, Tibor

    Published in Array (New York) (01-07-2020)
    “…Our increasing reliance on software products and the amount of money we spend on creating and maintaining them makes it crucial to find bugs as early and as…”
    Get full text
    Journal Article
  9. 9

    Why Will My Question Be Closed? NLP-Based Pre-Submission Predictions of Question Closing Reasons on Stack Overflow by Toth, Laszlo, Nagy, Balazs, Gyimothy, Tibor, Vidacs, Laszlo

    “…Closing a question on a community question answering forum such as Stack Overflow is a highly divisive event. On one hand, moderation is of crucial importance…”
    Get full text
    Conference Proceeding
  10. 10

    Prediction models for performance, power, and energy efficiency of software executed on heterogeneous hardware by Bán, Dénes, Ferenc, Rudolf, Siket, István, Kiss, Ákos, Gyimóthy, Tibor

    Published in The Journal of supercomputing (01-08-2019)
    “…Heterogeneous computer environments are becoming commonplace so it is increasingly important to understand how and where we could execute a given algorithm the…”
    Get full text
    Journal Article
  11. 11

    Empirical investigation of SEA-based dependence cluster properties by Beszédes, Árpád, Schrettner, Lajos, Csaba, Béla, Gergely, Tamás, Jász, Judit, Gyimóthy, Tibor

    Published in Science of computer programming (01-07-2015)
    “…Dependence clusters are (maximal) groups of source code entities that each depend on the other according to some dependence relation. Such clusters are…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Impact analysis in the presence of dependence clusters using Static Execute After in WebKit by Schrettner, Lajos, Jász, Judit, Gergely, Tamás, Beszédes, Árpád, Gyimóthy, Tibor

    “…SUMMARYImpact analysis based on code dependence can provide opportunities to identify parts of the software affected by a change. Because changes usually have…”
    Get full text
    Journal Article
  14. 14

    A formalisation of the relationship between forms of program slicing by Binkley, Dave, Danicic, Sebastian, Gyimóthy, Tibor, Harman, Mark, Kiss, Ákos, Korel, Bogdan

    Published in Science of computer programming (15-10-2006)
    “…The widespread interest in program slicing within the source code analysis and manipulation community has led to the introduction of a large number of…”
    Get full text
    Journal Article
  15. 15

    Continuous software quality supervision using SourceInventory and Columbus by Bakota, Tibor, Beszedes, Arpad, Ferenc, Rudolf, Gyimothy, Tibor

    “…Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and…”
    Get full text
    Journal Article
  16. 16

    Solutions for Reverse Engineering 4GL Applications, Recovering the Design of a Logistical Wholesale System by Nagy, Csaba, Vidács, László, Ferenc, Rudolf, Gyimóthy, Tibor, Kocsis, Ferenc, Kovács, István

    “…Re-engineering a legacy software system to support new, modern technologies instead of old ones is not an easy task, especially for large systems with a…”
    Get full text
    Conference Proceeding
  17. 17

    Empirical validation of object-oriented metrics on open source software for fault prediction by Gyimothy, T., Ferenc, R., Siket, I.

    Published in IEEE transactions on software engineering (01-10-2005)
    “…Open source software systems are becoming increasingly important these days. Many companies are investing in open source projects and lots of them are also…”
    Get full text
    Journal Article
  18. 18
  19. 19

    Development of a Unified Software Quality Platform in the Szeged InfoPólus Cluster by Beszédes, Á, Schrettner, L., Gyimóthy, T.

    “…In Software Quality Assurance, system status reports are key to the stakeholders for controlling software quality. Although we may rely on a large number of…”
    Get full text
    Conference Proceeding
  20. 20

    Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions by Ferenc, Rudolf, Hegedus, Peter, Gyimesi, Peter, Antal, Gabor, Ban, Denes, Gyimothy, Tibor

    “…The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of…”
    Get full text
    Conference Proceeding