| | | | |
| Preface | i |
| | |
| Contents | ii |
| | |
| Program | iv |
| | |
| Plenary talks | 1 |
| | |
| Tibor Gyimóthy | Software Maintenance and Evolution of Large Systems | 1 |
| | |
| Gábor Tardos | Fingerprinting Digital Documents | 2 |
| | |
| Papers | 4 |
| | |
| Ali Al-Haboobi, Gábor Kecskeméti | Reducing Execution Time of An Existing Lambda based Scientific Workflow System | 3 |
| | |
| Ádám Fodor, László Kopácsi, Zoltán Á. Milacski, András Lőrincz | Speech de-identification withdeep neural networks | 7 |
| | |
| Ahmad T. Anaqreh, Boglárka G.-Tóth, Tamás Vinkó | Symbolic Regression for Approximating Graph Geodetic Number: A preliminary study | 11 |
| | |
| András Márkus | Task allocation possibilities in simulated Fog environments | 15 |
| | |
| Artúr Poór | Static Analysis Framework for Scala | 19 |
| | |
| Attila Szatmári | An Evaluation on Bug Taxonomy and Fault Localization Algorithms in JavaScript Programs | 23 |
| | |
| Balázs Szűcs, Áron Ballagi | An Industrial Application of Autoencoders for Force-Displacement Measurement Monitoring | 28 |
| | |
| Bence Bogdándy, Zsolt Tóth | Overview of Artificial Neural Network Abduction and Inversion Methods | 32 |
| | |
| Biswajeeban Mishra, Biswaranjan Mishra | Evaluating and Analyzing MQTT Brokers with Stress-testing | 36 |
| | |
| Csaba Bálint | Iterative Operations on Footpoint Mappings | 40 |
| | |
| Dániel Balázs Rátai, Zoltán Horváth, Zoltán Porkoláb, Melinda Tóth | Traquest model -- a novel model for ACID concurrent computations | 44 |
| | |
| Dániel Pásztor, Péter Ekler, János Levendovszky | Energy-efficient routing in Wireless Sensor Networks | 49 |
| | |
| Dávid Papp | Spectral Clustering based Active Zero-shot Learning | 54 |
| | |
| Dilshad Hassan Sallo, Gábor Kecskeméti | Parallel Simulation for The Event System of DISSECT-CF | 58 |
| | |
| Ebenezer Komla Gavua, Gábor Kecskeméti | Improving MapReduce Speculative Executions with Global Snapshots | 62 |
| | |
| Gábor Karai, Péter Kardos | Distance-based Skeletonization on the BCC Grid | 66 |
| | |
| Gábor Székely, Gergő Ládi, Tamás Holczer, Levente Buttyán | Towards Reverse Engineering Protocol State Machines | 70 |
| | |
| Gabriella Tóth, Máté Tejfel | Component-based error detection of P4 programs | 74 |
| | |
| György Papp, Miklós Hoffmann, Ildikó Papp | Embedding QR code onto triangulated meshes | 79 |
| | |
| Hamza Baniata | Fog-enhanced Blockchain Simulation | 83 |
| | |
| Hayder K. Fatlawi, Attila Kiss | Activity Recognition Model for Patients Data Stream using Adaptive Random Forest and Deep Learning Techniques | 88 |
| | |
| István Fábián, Gábor György Gulyás | On the Privacy Risks of Large-Scale Processing of Face Imprints | 91 |
| | |
| Jenifer Tabita Ciuciu-Kiss, István Bozó, Melinda Tóth | Towards Version Controlling in RefactorErl | 95 |
| | |
| José Vicente Egas-López, Gábor Gosztolya | Using the Fisher Vector Approach for Cold Identification | 99 |
| | |
| László Viktor Jánoky, János Levendevoszky, Péter Ekler | A Novel JWT Revocation Algorithm | 103 |
| | |
| Márton Juhász, Dorottya Papp, Levente Buttyán | Towards Secure Remote Firmware Updateon Embedded IoT Devices | 107 |
| | |
| Mátyás Kiglics, Csaba Bálint | Quadric tracing: A geometric method for accelerated sphere tracing of implicit surfaces | 111 |
| | |
| Mohammed B. M. Kamel, Péter Ligeti, Christoph Reich | Private/Public Resource Discovery for IoT: A Two-Layer Decentralized Model | 115 |
| | |
| Mohammed Mohammed Amin, István Megyeri | Improving keyword spotting with limited training data using non-sequential data augmentation | 119 |
| | |
| Orsolya Kardos, Tamás Vinkó | Social network characteristics from the viewpoint of centrality measures | 123 |
| | |
| Péter Hudoba, Attila Kovács | Toolset for supporting the number system research | 128 |
| | |
| Róbert Bán, Gábor Valasek | Geometric Distance Fields of Plane Curves | 132 |
| | |
| Roland Nagy, Levente Buttyán | Towards Rootkit Detection on Embedded IoT Devices | 135 |
| | |
| Sándor Balázs Domonkos, Tamás Németh | Use data mining methods in quality measurement in the education systems | 139 |
| | |
| Tamás Aladics, Judit Jász, Rudolf Ferenc | Feature Extraction from JavaScript | 143 |
| | |
| Tekla Tóth, Levente Hajder | Minimal solution for ellipse estimation from sphere projection using three contour points | 147 |
| | |
| Viktor Homolya, Tamás Vinkó | Side road to axioms for two-dimensional centralities: Network reconstruction from hub and authority values | 151 |
| | |
| Yuping Yan, Péter Ligeti | A Combination of Attribute-Based Credentials with Attribute-Based Encryption for a Privacy-Friendly Authentication | 154 |
| | |
| Zoltán Richárd Jánki, Vilmos Bilicki | Crosslayer Cache for Telemedicine | 158 |
| | |
| Zoltán Szabó, Vilmos Bilicki | EHR Data Protection with Filtering of Sensitive Information in Native Cloud Systems | 163 |
| | |
| List of Authors | 167 |
| | |