| | | | |
| Preface | i |
| | |
| Contents | ii |
| | |
| Program | iv |
| | |
| Abstracts | 1 |
| | |
| Elvira Antal and Erika Griechisch | Symbolic Tools for Reformulation of Unconstrained Nonlinear Optimization Problems | 1 |
| | |
| Artyom Antyipin, Attila G�bi, and Tam�s Kozsik | Low Level Conditional Move Optimization (Intel Sandy Bridge and AMD K12) | 2 |
| | |
| Viktor �gil�n, J�nos Balogh, Bal�zs D�vid, and Mikl�s Kr�sz | Heuristic Methods for the Bus Rescheduling Problem | 3 |
| | |
| P�ter Bodn�r | Barcode Detection with Uniform Partitioning and Morphological Operations | 4 |
| | |
| Zsolt Borsi | Describing interaction relationships in SMV language | 6 |
| | |
| Andr�s B�ta, Mikl�s Kr�sz, and Andr�s Pluh�r | Efficient simulation of infection processes | 7 |
| | |
| Gabriella Div�ki | An online 1-dimensional clustering problem with variable sized clusters | 8 |
| | |
| Tibor Dobj�n and G�bor N�meth | Spectrum skeletonization: a new method for acoustic sign feature extraction | 9 |
| | |
| ��d�m Fazekas, Hiroshi Daimon, Hiroyuki Matsuda, and L�szl� T�th | Computation of Background for Photoemission Electron Microscope Image Using FPGA | 10 |
| | |
| B�lint Fodor | Environment Matting by Sparse Recovery | 11 |
| | |
| E. F�ldi, A. Mosavi, A. Delavar, K. N. Hewage, A. S. Milani, A. A. Moussavi, and M. Yeheyis | Reconsidering theMultiple Criteria DecisionMaking Problems of Construction Projects; Using Advanced Visualization and Data Mining Tools | 13 |
| | |
| Andr�s F�l�p | A Biological Driven Method for Correlation Clustering | 15 |
| | |
| Mih�ly Gara and P�ter Bal�zs | Artificial Intelligence Methods in Discrete Tomography | 16 |
| | |
| Attila G�bi, Zal�n Sz�gyi, and Tam�s Kozsik | Embedding a Query Language into C++ | 17 |
| | |
| Erika Griechisch and J�nos Csirik | Acceleration-based Online Signature Verification | 18 |
| | |
| Gergely Guly�s and J�zsef Dombi | The vagueness measure: a new interpretation and an application to image thresholding | 19 |
| | |
| Norbert Hantos, P�ter Bal�zs, and K�lm�n Pal�gyi | Binary Tomography Using Two Projections and Morphological Skeleton | 20 |
| | |
| L�szl� Heged�s | On Some Subsystems of Interval-Valued Logic | 21 |
| | |
| L�szl� Heged�s and Benedek Nagy | Periodicity of Circular Words | 22 |
| | |
| P�ter Heged�s | A Probabilistic Software Quality Model for C# – an Industrial Case Study | 23 |
| | |
| Ren�ta Hodov�n | The Security History of the WebKit Browser Engine | 25 |
| | |
| Bal�zs Keresztury and L�szl� Cser | Introduction to an automatized cheating prevention system at computerized open-book lab exams | 26 |
| | |
| P�ter Kov�cs | Wavelets and rational function methods in ECG signal processing | 28 |
| | |
| Edit L�z�r | PhP + MySQL questions and possible answers | 30 |
| | |
| Szid�nia Lefkovits | Hybrid Face Detector Based on Boosted Classifiers | 31 |
| | |
| Bal�zs L�szl� L�vai | Verified localization of trajectories with prescribed behaviour in the forced damped pendulum | 33 |
| | |
| Levente L�csi and Ferenc Schipp | Analysis of a hyperbolic optimization method | 34 |
| | |
| Amir Mosavi and Mikl�s Hoffmann, A. S. Milani | Adapting the Reactive Search Optimization and Visualization Algorithms for Multiobjective Optimization Problems; Application to Geometry | 35 |
| | |
| Gy�rgy M�ra | Approximate dictionary matching for biomedical information extraction | 37 |
| | |
| Istv�n Nagy T. | Wikipedia-based methods to identify noun compounds in running texts | 39 |
| | |
| J�zsef N�meth | Online Signature Feature Extraction from Video | 40 |
| | |
| Gy�rgy Orb�n | Analysing Synchronization Contract Support in Modern Software Development Methodologies | 41 |
| | |
| Istv�n Orosz and Tam�s Orosz | Change management applying comparison of different versions of Dynamics AX | 43 |
| | |
| Zolt�n Ozsv�r and P�ter Bal�zs | Empirical Studies of Reconstructing hv-Convex Binary Matrices from Horizontal and Vertical Projections | 44 |
| | |
| Kriszti�n P�ndi and Hassan Charaf Dr. | Synergy between mobile terminal and cloud computing. | 45 |
| | |
| Zsombor Par�czi | x86 instruction reordering for code compression | 47 |
| | |
| Istv�n P�ser | Non-destructive Examination of Tree Trunks with the Help of National Instruments Devices | 49 |
| | |
| Attila Selmeci and Tam�s G�bor Orosz | Workflow processing using SAP Objects | 50 |
| | |
| Melinda Simon | AST-based source code analysis and visualization | 51 |
| | |
| Tam�s S�muel Tasi and P�ter Bal�zs | Extracting Geometrical Features of Discrete Images from Their Projections | 52 |
| | |
| Tam�s Szirbucz | Ideas for Improving Efficiency of Procedural Abstraction | 53 |
| | |
| Alex Torm�si and L�szl� T. K�czy | Efficiency and Accuracy Analysis of a Fuzzy Single-Stroke Character Recognizer with Various Rectangle Fuzzy Grids | 54 |
| | |
| G�bor Valasek, Levente Sallai, Andr�s J�mbori, and J�lia Horv�th | Geometric Newton-Raphson Methods for Plane Curves | 56 |
| | |
| L�szl� Varga, P�ter Bal�zs, and Antal Nagy | A Novel Optimization-Based Reconstruction Algorithm for Multivalued Discrete Tomography | 57 |
| | |
| List of Participants | 58 |
| | |
| Notes | 61 |
| | |