default search action
Judit Jász
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Judit Jász:
The Effectiveness of Hidden Dependence Metrics in Bug Prediction. IEEE Access 12: 77214-77225 (2024) - [d1]Judit Jász:
The effectiveness of hidden dependence metrics in bug prediction - online appendix. IEEE DataPort, 2024 - 2022
- [j6]Zoltán Ságodi, Edit Pengo, Judit Jász, István Siket, Rudolf Ferenc:
Static Call Graph Combination to Simulate Dynamic Call Graph Behavior. IEEE Access 10: 131829-131840 (2022) - [c18]Judit Jász, Péter Hegedüs, Ákos Milánkovich, Rudolf Ferenc:
An End-to-End Framework for Repairing Potentially Vulnerable Source Code. SCAM 2022: 242-247 - 2021
- [c17]Zsolt János Szamosvölgyi, Endre Tamás Váradi, Zoltán Tóth, Judit Jász, Rudolf Ferenc:
Assessing Ensemble Learning Techniques in Bug Prediction. ICCSA (7) 2021: 368-381 - [c16]Tamás Aladics, Judit Jász, Rudolf Ferenc:
Bug Prediction Using Source Code Embedding Based on Doc2Vec. ICCSA (7) 2021: 382-397 - [i1]Tamás Aladics, Judit Jász, Rudolf Ferenc:
Bug Prediction Using Source Code Embedding Based on Doc2Vec. CoRR abs/2110.04951 (2021) - 2020
- [j5]Rudolf Ferenc, Tamás Viszkok, Tamás Aladics, Judit Jász, Péter Hegedüs:
Deep-water framework: The Swiss army knife of humans working with machine learning models. SoftwareX 12: 100551 (2020)
2010 – 2019
- 2019
- [c15]Judit Jász, István Siket, Edit Pengo, Zoltán Ságodi, Rudolf Ferenc:
Systematic Comparison of Six Open-source Java Call Graph Construction Tools. ICSOFT 2019: 117-128 - 2018
- [c14]Judit Jász, Árpád Beszédes:
Software Testing Conferences and Women. GE@ICSE 2018: 17-20 - 2016
- [c13]Dávid Tengeri, László Vidács, Árpád Beszédes, Judit Jász, Gergö Balogh, Béla Vancsics, Tibor Gyimóthy:
Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. ICST Workshops 2016: 174-179 - 2015
- [j4]Árpád Beszédes, Lajos Schrettner, Béla Csaba, Tamás Gergely, Judit Jász, Tibor Gyimóthy:
Empirical investigation of SEA-based dependence cluster properties. Sci. Comput. Program. 105: 3-25 (2015) - [c12]David W. Binkley, Árpád Beszédes, Syed S. Islam, Judit Jász, Béla Vancsics:
Uncovering dependence clusters and linchpin functions. ICSME 2015: 141-150 - 2014
- [j3]Richárd Dévai, Judit Jász, Csaba Nagy, Rudolf Ferenc:
Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Acta Cybern. 21(3): 419-437 (2014) - [j2]Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy:
Impact analysis in the presence of dependence clusters using Static Execute After in WebKit. J. Softw. Evol. Process. 26(6): 569-588 (2014) - 2013
- [c11]Béla Csaba, Lajos Schrettner, Árpád Beszédes, Judit Jász, Péter Hegedüs, Tibor Gyimóthy:
Relating Clusterization Measures and Software Quality. CSMR 2013: 345-348 - [c10]Árpád Beszédes, Lajos Schrettner, Béla Csaba, Tamás Gergely, Judit Jász, Tibor Gyimóthy:
Empirical investigation of SEA-based dependence cluster properties. SCAM 2013: 1-10 - 2012
- [c9]Judit Jász, Lajos Schrettner, Árpád Beszédes, Csaba Osztrogonác, Tibor Gyimóthy:
Impact Analysis Using Static Execute After in WebKit. CSMR 2012: 95-104 - [c8]Árpád Beszédes, Tamás Gergely, Lajos Schrettner, Judit Jász, Laszlo Lango, Tibor Gyimóthy:
Code coverage-based regression test selection and prioritization in WebKit. ICSM 2012: 46-55 - [c7]Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy:
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit. SCAM 2012: 24-33 - 2010
- [c6]Gabriella Tóth, Csaba Nagy, Judit Jász, Árpád Beszédes, Lajos Jeno Fülöp:
CIASYS--Change Impact Analysis at System Level. CSMR 2010: 198-201 - [c5]Gabriella Tóth, Péter Hegedüs, Árpád Beszédes, Tibor Gyimóthy, Judit Jász:
Comparison of different impact analysis methods and programmer's opinion: an empirical study. PPPJ 2010: 109-118
2000 – 2009
- 2009
- [b1]Judit Jász:
Függőség alapú statikus programszeletelés és közelítései. University of Szeged, Hungary, 2009 - 2008
- [c4]Judit Jász, Árpád Beszédes, Tibor Gyimóthy, Václav Rajlich:
Static Execute After/Before as a replacement of traditional software dependencies. ICSM 2008: 137-146 - [c3]László Vidács, Judit Jász, Árpád Beszédes, Tibor Gyimóthy:
Combining Preprocessor Slicing with C/C++ Language Slicing. ICPC 2008: 163-171 - 2007
- [c2]Árpád Beszédes, Tamás Gergely, Judit Jász, Gabriella Tóth, Tibor Gyimóthy, Václav Rajlich:
Computation of Static Execute After Relation with Applications to Software Maintenance. ICSM 2007: 295-304 - 2005
- [j1]Ákos Kiss, Judit Jász, Tibor Gyimóthy:
Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Softw. Qual. J. 13(3): 227-245 (2005) - 2003
- [c1]Ákos Kiss, Judit Jász, Gábor Lehotai, Tibor Gyimóthy:
Interprocedural Static Slicing of Binary Executables. SCAM 2003: 118-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint