- Model-Driven Software Engineering Techniques
- Advanced Software Engineering Methodologies
- Service-Oriented Architecture and Web Services
- Cloud Computing and Resource Management
- Peer-to-Peer Network Technologies
- Software System Performance and Reliability
- Caching and Content Delivery
- Cooperative Communication and Network Coding
- Web Applications and Data Management
- Web Data Mining and Analysis
- IoT and Edge/Fog Computing
- Business Process Modeling and Analysis
- Multimedia Communication and Technology
- Semantic Web and Ontologies
- Distributed and Parallel Computing Systems
- Modular Robots and Swarm Intelligence
- Advanced Data Storage Technologies
- Opportunistic and Delay-Tolerant Networks
- Handwritten Text Recognition Techniques
- Software Testing and Debugging Techniques
- Neural Networks and Applications
- Simulation Techniques and Applications
- Natural Language Processing Techniques
- Complex Network Analysis Techniques
- Mobile and Web Applications
Budapest University of Technology and Economics
2010-2023
Andrássy University Budapest
2003-2011
Budapest Institute
1995-2000
Eötvös Loránd University
1995-1999
Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP that direct among two devices carried out over dynamically assigned, licensed spectrum; thus, it under full control cellular network. creates market potential for new services, approaches to efficient spectrum use, security concepts. This especially true if extended larger groups organized in...
Highly configurable metamodeling environments and graph transformation techniques have been applied successfully in software system modeling other areas. In this paper a uniform treatment of these two methods is illustrated by tool called Visual Modeling Transformation System. The concepts an n-layer environment outlined with the related topological attribute issues. Built on alternatives for model are elaborated, namely, traversal graph-rewriting approaches. our implementation all...
This paper is advocating for joint design of communication and control in cyber physical systems, especially self driving automobiles, exploiting adaptive next generation networking concepts such as mobile edge clouds 5G commu- nication systems. In this paper, we present our '5G connected- cars' testbed that was demonstrated multiple international events including the Mobile World Congress, Barcelona 2016. It constitutes a complete network architecture cloud software services facilitates...
This paper presents the implementation of synchronized multimedia streaming for Apple iPhone platform. The idea is to stream content from a single source multiple receivers with direct or multi-hop connections source. First we look into existing solutions video on point-to-point architectures. After acknowledging their limitations, propose solution based network coding efficiently and reliably deliver many devices in manner. Then introduce an application that implements this technique...
With the proliferation of cloud service providers, use non-relational (NoSQL) data stores is increasing. In contrast to standard relational database schema design, which has its strong mathematical background in algebra and set theory, development with NoSQL largely based on empirical best practices. Furthermore, huge variety variants may require different design considerations. this paper, an algorithm introduced automatically derive cost performance optimal column-oriented predefined...
This work presents the implementation of synchronized multimedia streaming for Apple iPhone platform. The idea is to stream content from a single source multiple receivers with direct or multihop connections source. First we look into existing solutions video on that use point-to-point architectures. After acknowledging their limitations, propose solution based network coding efficiently and reliably deliver many devices in manner. Then introduce an application implements this technique...
The Internet of Things (IoT) is transforming the surrounding everyday physical objects into an ecosystem information that enriches our life. IoT represents convergence advances in miniaturization, wireless connectivity, and increased data storage driven by various sensors. Sensors detect measure changes position, temperature, light, many others; furthermore, they are necessary to turn billions data-generating “things” can report on their status often interact with environment. Application...
This paper describes the implementation of network coding on OpenGL-enabled graphics cards. Network is an interesting approach to increase capacity and robustness in multi-hop networks. The current problem implement random linear mobile devices which are limited computational power, energy, memory. Some equipped with a 3D accelerator, could be used do most RLNC related calculations. Such cross-over have already been computationally demanding research tasks as physics or medicine. As first...
This paper advocates the use of random linear network coding for storage in distributed clouds order to reduce and traffic costs dynamic settings, i.e. when adding removing numerous devices/clouds on-the-fly number reachable is limited. We introduce various approaches that trade-off reliability, costs, system complexity relying on probabilistic recoding cloud regeneration. compare these with other based data replication Reed-Solomon codes. A simulator has been developed carry out a thorough...
The focus of the research and development activities in Intelligent Transportation Systems is to increase road traffic safety improve transport efficiency. Telematics can provide values on both fields, by providing real-time reliable vehicle specific information [1]. Road related be categorized into several types, but technical provided through electronic network today's vehicles becoming an increasingly important segment. Using standard onboard diagnostics (OBD) a popular solution nowadays...
The introduction of UML class diagrams has not raised the abstraction level development to extent that was intended: are only visual representations source skeletons implemented in a programming language. To improve productivity, domain-specific languages applied, which cover narrow domain, and their high makes use domain experts easier. simultaneous evolution code software models causes loss synchronization. Round-tripping is supported by model-driven tools, because gap between generated...
Model transformation means converting an input model available at the beginning of process to output model. A widely used approach uses graph rewriting as underlying technique. In case diagrammatic languages, such Unified Modeling Language (UML), exclusive topological matching is found be not enough. To define precisely steps beyond topology visual models, additional constraints must specified which ensures correctness attributes, or other properties enforced. Dealing with OCL provides a...
Nowadays the capabilities of autonomous robots have increased rapidly. However there are situations where one robot is not sufficient. In this paper we will introduce a completely distributed algorithm for tracing and surrounding moving objects or targets using homogenous, medium scaled swarm based on local sensing. Our new approach already known concept basis behaviors as ubiquitous general building blocks synthesizing artificial group behavior. goal was to generate an simple rules in order...
Distributed systems and Web applications play an important role in computer science nowadays. The most common consideration is performance, because these must provide services with low response time, high availability, certain throughput level. performance of a application affected by several factors. goal our work to analyze how some them affect the time. In this paper, effects two configurable settings ASP.NET server are discussed: limit global queue queue. time test measured, while...
The utilization of RFID-related (radio-frequency identification) technologies became very common in the last few years. effected main areas are highway surveillance systems, access cards, transport payments, RFID passports and product tracking systems. Tagged products can be tracked an appropriately equipped warehouse with help installed readers. movement customers followed because a tag attached to shopping cart or stored it. In this paper, assuming such environment, it has been examined...
Although cloud systems provide a reliable and flexible storage solution, the use of single service constitutes point failure, which can compromise data availability, download speed, security. To address these challenges, we advocate for multiple providers simultaneously using network coding as key enabling technology. Our goal is to study two challenges coded systems. First, efficient update number fragments per in system aggregating clouds order boost speed files. We developed novel scheme...
Model-driven Software Engineering is one of the most focused research fields. Model processors automatically generate lower level artefacts. Graph transformation a widely used technique for model transformations. Especially visual transformations can be expressed by graph This paper presents control flow support Visual Modelling and Transformation System discusses principles constraint-driven validated transformation. The presented approach helps to validate, preserve or guarantee certain...