| | | | |
| Preface | i |
| | |
| Contents | ii |
| | |
| Program | iv |
| | |
| Plenary talks | 1 |
| | |
| Bálint Daróczy | Riemann Manifolds and Hierarchical Structures | 1 |
| | |
| Michael C. Mackey | Understanding, Treating and Avoiding Hematological Disease: Better Medicine Through Mathematics? | 2 |
| | |
| Massimiliano Di Penta | Empirical Assessment of Software Engineering Research: Pitfalls and Solutions | 3 |
| | |
| Papers | 4 |
| | |
| Abigél Mester, Emilia Heinz, Balázs Bánhelyi, Elvira D. Antal, Edit Mikóné Jónás, József Horváth, and Tibor Csendes | Decision support heuristic for dairy farms | 4 |
| | |
| Abrar Hussain, József Dombi | A new Approach to Fuzzy Control using Distending Function | 8 |
| | |
| Ádám Belákovics, Arnold Czémán, Imre Szeberényi | Designing and testing VM allocation algorithms for the CIRCLE Cloud manager | 13 |
| | |
| Ádám Budai and Kristóf Csorba | Deep Reinforcement Learning: A study of the CartPole problem | 17 |
| | |
| Ákos Tóth, Roland Kunkli | An approximative and semi-automated method to create MPEG-4 compliant human face models | 21 |
| | |
| András Kicsi, Viktor Csuvik | Feature Level Metrics Based on Size and Similarity in Software Product Line Adoption | 25 |
| | |
| András Márkus, Attila Kertész | Multi-Cloud Management Strategies for Simulating IoT Applications | 29 |
| | |
| Andrea Huszti, Norbert Oláh | Identity-Based Cloud Authentication Protocol | 33 |
| | |
| Biswajeeban Mishra | Evaluating the Performance of MQTT Brokers | 37 |
| | |
| Bouafia Khawla, Bálint Molnár | Dynamic business process: comparative models and workflow patterns | 41 |
| | |
| Chaman Verma, Veronika Stoffová, Zoltán Illés, Sanjay Dahiya | Binary logistic regression classifying the gender of student towards Computer Learning in European schools | 45 |
| | |
| Csaba Bálint, Gábor Valasek | Operations on Signed Distance Functions | 49 |
| | |
| Dániel Lukács, Gergely Pongrácz, Máté Tejfel | Keeping P4 switches fast and fault-free through automatic verification | 52 |
| | |
| Dávid Nagy, Tamás Mihálydeák, László Aszalós | Different Types of Search Algorithms for Rough Sets | 56 |
| | |
| Dénes Bartha | Reconstruction of Rooted Directed Trees | 60 |
| | |
| Dóra Mattyasovszky-Philipp, Bálint Molnár | Cognitive Enterprise and Cognitive Information Systems | 64 |
| | |
| Edit Pengő Zoltán Ságodi, Ervin Kóbor | Who Are You not gonna Call? A Definitive Comparison of Java Static Call Graph Creator Tools | 68 |
| | |
| Enikő Ilyés | Agile method in education | 72 |
| | |
| Gábor Horváth, Réka Kovács, Péter Szécsi | Towards Proper Differential Analysis of Static Analysis Engine Changes | 75 |
| | |
| Gábor Lékó, Péter Balázs, László G. Varga | Projection selection with sequential selection methods using different evaluation measures | 79 |
| | |
| Gabriella Tóth and Máté Tejfel | Axiom-based property verification for P4 programs | 80 |
| | |
| Gergely Pap, Tamás Grósz, László Tóth | Semi-Supervised Training of Cell-Classifier Neural Networks | 84 |
| | |
| György Kalmár, Alexandra Büki, Gabriella Kékesi, Gyöngyi Horváth, László G. Nyúl | Feature extraction and classification for pupillary images of rats | 88 |
| | |
| István Orosz, Attila Selmeci | Software as a Service operation model in cloud based ERP systems | 92 |
| | |
| Judit Szűcs, Péter Balázs | Strip Constrained Binary Tomography | 96 |
| | |
| Kitti Gelle, Szabolcs Iván | Lookahead can help in maximal matching | 97 |
| | |
| Krisztián Ilku, Judit Tamás | Topology-based Classification Error Calculation based on IndoorGML Document | 101 |
| | |
| László Péter Pusztai, Balázs Kocsis, István Budai, Lajos Nagy | Industrial process modelling with operations research method | 106 |
| | |
| László Tóth | Preliminary Concepts for Requirements Mining and Classification using Hidden Markov Model | 110 |
| | |
| Márton Véges, Viktor Varga | Monocular Estimation of 3D Poses from a Distance | 114 |
| | |
| Máté Csákvári, András Sárkány | Towards the understanding of object manipulations by means of combining common sense rules and deep networks | 118 |
| | |
| Nadera Aljawabrah, Tamás Gergely | Visualization of test-to-code relations to detect problems of unit tests | 122 |
| | |
| Norbert Luksa, Tamás Kozsik | Parallelisation of Haskell Programs by Refactoring | 126 |
| | |
| Péter Gál | JavaScript-only Parallel Programming of Embedded Systems | 130 |
| | |
| Péter Gál, Edit Pengő | Primitive Enthusiasm: A Road to Primitive Obsession | 134 |
| | |
| Péter Hudoba, Péter Burcsi | Multi party computation motivated by the birthday problem | 138 |
| | |
| Róbert Adrian Rill, Kinga Bettina Faragó | Gaze-based Cursor Control Impairs Performance in Divided Attention | 140 |
| | |
| Sándor Bácsi and Gergely Mezei | Towards a Classification to Facilitate the Design of Domain-Specific Visual Languages | 144 |
| | |
| Sándor Balázs Domonkos, Németh Tamás | Use data mining methods in quality measurement in the education systems | 148 |
| | |
| Szabolcs Szekér, Ágnes Vathy-Fogarassy | Measuring the similarity of two cohorts in the n-dimensional space | 151 |
| | |
| Thanh-Binh V. Lam | Should we omit the practical aspects in modeling the server clusters? | 155 |
| | |
| Tibor Brunner, Péter Szécsi, Zoltán Porkoláb | Bug path reduction strategies for symbolic execution | 159 |
| | |
| Tibor Kovács, Gábor Simon and Gergely Mezei | Benchmarking Graph Database Backends-WhatWorks Well with Wikidata? | 163 |
| | |
| Viktor Homolya | Graph-based analysis of Influence Spread | 167 |
| | |
| Viktor Varga, Márton Véges | Exploiting temporal context in 2d to 3d human pose regression | 169 |
| | |
| Yangyuan Li, Tien Van DO | Regression Models to Predict the Resource Usage of MapReduce Application | 173 |
| | |
| Yangyuan Li, Tien Van DO | Long Short-term Memory Recurrent Neural Networks Models to Forecast the Resource Usage of MapReduce Applications | 176 |
| | |
| Zoltán Richárd Jánki, Vilmos Bilicki | Full-stack FHIR-based MBaaS with Server- and Client-side Caching Capable WebDAO | 179 |
| | |
| Zoltán Szabó, Vilmos Bilicki | A FHIR-based healthcare system backend with deep cloud side security | 184 |
| | |
| Zsolt Mihály, Zsombor Sentes, Zoltán Lelkes | Ant Colony Optimization Based Algorithm For Solving Scheduling Problems with Setup Times on Parallel Machines | 188 |
| | |
| Zsolt Parragi, Zoltán Porkoláb | Instantiation context aware types in C++ | 192 |
| | |
| Zsombor Paróczi | LZ based compression benchmark on PE files | 195 |
| | |