SYNASC2022: 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING
PROGRAM

Days: Monday, September 12th Tuesday, September 13th Wednesday, September 14th Thursday, September 15th

Monday, September 12th

View this program: with abstractssession overviewtalk overview

09:20-10:50 Session 2: Tutorial: Quantified Boolean Formulas - Martina Seidl

Tutorial: Quantified Boolean Formulas

Abstract:

Many application problems from artificial intelligence, verification, and formal synthesis can be efficiently encoded as quantified Boolean formulas (QBFs), the extension of propositional logic with quantifiers. This extension makes the QBF decision problem PSPACE-complete (in contrast to SAT which is NP-complete).Over the last years, much progress has been made concerning the theory and practice of QBF research. In this tutorial, we review the state of the art of QBF technology and show how to perform automated reasoning with QBFs.

Location: Room 1
10:50-11:10Coffee Break
11:10-12:00 Session 3: Invited talk: Reasoning with SAT and Beyond - Martina Seidl

Invited talk: Reasoning with SAT and Beyond

Abstract:

One of the biggest success stories of symbolic artificial intelligence is written by SAT solvers, i.e., by tools that answer the question if a given propositional formula is satisfiable or not. Despite the NP-hardness of SAT, modern solvers are able to decide huge formula instances from industrial application domains like formal verification. The performance boost of SAT solvers we have seen over the last 20 years only became possible by cleverly exploiting the problem structure of the formula, by a tight integration of powerful search and inference techniques, and advanced heuristics. Because of their power, SAT solvers are nowadays also the backend reasoning engines for solving decision problems beyond NP like QBF, SMT, and MaxSAT. 

In this talk, we shortly trace the story of SAT solving and show how SAT helps to solve problems beyond NP. We identify open challenges related to other branches of symbolic reasoning and artificial intelligence. 

Location: Room 1
12:00-13:30Lunch Break
13:30-15:10 Session 4: Symbolic Computation Session (1)
Location: Room 1
13:30
F-polynomials and Newton polytopes (abstract)
13:50
Homotopy Techniques for Analytic Combinatorics in Several Variables (abstract)
PRESENTER: Kisun Lee
14:10
Detecting Implicit Indeterminates in Symbolic Computation (abstract)
14:30
Balanced Dense Multivariate Multiplcation: The General Case (abstract)
14:50
A web version of TARSKI, a system for computing with Tarski formulas and semialgebraic sets (abstract)
PRESENTER: Robert Vajda
15:10-15:30Coffee Break
15:30-16:50 Session 5A: Symbolic Computation Session (2) + Numerical Computing Session
Location: Room 1
15:30
Artificial Conflict Sampling for Real Satisfiability Problems (abstract)
15:50
Algorithm for intersecting symbolic and approximate linear differential varieties (abstract)
PRESENTER: Siyuan Deng
16:10
A Neural Network based approach to find solutions to diffusion equations (abstract)
16:30
Extreme Points of the Unit Ball B4 in a Space of Real Polynomials of Degree at most Four with the Supremum Norm (abstract)
15:30-16:50 Session 5B: Workshop on Natural Computing and Applications
Location: Room 2
15:30
Organic Structures Emerging From Bio-Inspired Graph-Rewriting Automata (abstract)
15:50
The XGBoost Tuning by Improved Firefly Algorithm for Network Intrusion Detection (abstract)
16:10
An Evaluation of Image Texture Descriptors and their Invariant Properties (abstract)
16:30
On Using Perceptual Loss within the U-Net Architecture for the Semantic Inpainting of Textile Artefacts with Traditional Motifs (abstract)
16:50-17:10Coffee Break
17:10-19:10 Session 6A: Special Session on Symbolic Regression
Location: Room 1
17:10
Symbolic Regression with augmented dataset using RuleFit (abstract)
17:30
Comparison of OLS and NLS to fit Transformation-Interaction-Rational expressions (abstract)
17:50
Steel Phase Kinetics Modeling using Symbolic Regression (abstract)
PRESENTER: David Piringer
18:10
Identification of Discrete Non-Linear Dynamics of a Radio-Frequency Power Amplifier Circuit using Symbolic Regression (abstract)
18:30
Local Optimization Often is Ill-conditioned in Genetic Programming for Symbolic Regression (abstract)
18:50
Application of Symbolic Regression in Polymer Processing (abstract)
PRESENTER: Wolfgang Roland
17:10-18:30 Session 6B: Special Session for PhD students (1)
Location: Room 2
17:10
Accelerating Gröbner Basis Computation via Weighted Ordering in Parameter Identifiability of ODE Models (abstract)
PRESENTER: Ilia Ilmer
17:30
AlphaFold-based protein analysis pipeline (abstract)
17:50
Effective Prediction System For Affective Computing On Emotional Psychology With Artificial Neural Network (abstract)
18:10
Different approaches for biological strings (abstract)
19:00-20:00Wellcome Party
Tuesday, September 13th

View this program: with abstractssession overviewtalk overview

09:00-10:00 Session 8: Hagenberg Research
Location: Room 1
09:00
Software Park Hagenberg
09:10
RISC: A center for symbolic computation and its applications
09:20
Research and Development at RISC Software
09:30
The new COMET Centre INTEGRATE
09:40
R&D at University of Applied Sciences Upper Austria in Hagenberg”
10:00-10:50 Session 9: Invited talk: Prescriptive Analytics: When data- and simulation-based models interact in a cooperative way - Michael Affenzeller

Prescriptive Analytics: When data- and simulation-based models interact in a cooperative way

Abstract:

Prescriptive Analytics is an interdisciplinary topic in an interdisciplinary field, or put another way it is a synergistic hybridisation of various methods and algorithms from statistics, computer science, artificial intelligence, mathematics and operations research. Its aim is to provide optimized recommendations for action in various application areas. In this way, knowledge gained in the digital world is brought back to the real world, providing better and more efficient procedures, designs and processes.

Simulation and data-based models have several advantages and limitations. Simulation-based representations of reality can be very accurate; however, they are often too costly for the purpose of integration into powerful optimization methods. Data-based surrogate models on the other hand can be highly efficient in application – but may not be as accurate. Appropriate hybridizations of these approaches in terms of prescriptive analytics have the potential to support and complement each other and decisively advance research areas such as simulation-based optimization.

The presentation will include methodological research topics that are currently being pursued in the HEAL research group [https://heal.heuristiclab.com/] led by Affenzeller as well as concrete project results that have already found their way into economic and industrial applications.

Location: Room 1
10:50-11:10Coffee Break
11:10-12:00 Session 10: Invited talk: SAT Solvers and Quantum Computing: Potential and Challenges - Robert Wille

Invited talk: SAT Solvers and Quantum Computing: Potential and Challenges

Abstract:

SAT or SMT solvers are well-established in conventional computing where they are used to solve a broad variety of problems, e.g., in the design of circuits and systems. With the emerging of quantum computers, it is natural to wonder whether the prospects of SAT-based solutions can also be materialized for this emerging technology. For one thing, many of the design tasks for quantum computing have been proven to be NP-hard—a class of problems for which SAT solvers are rather suited. Then again, quantum computing deals with quantum-mechanical concepts such as superposition and entanglement—easily rendering SAT unfeasible at a first glance. In this talk, we are investigating whether SAT solvers and quantum computing harbor potential; and, if so, what are the challenges in fully exploiting them.

Location: Room 1
12:00-13:30Lunch Break
13:30-15:00 Session 11: Tutorial: Mathematical Model Checking in RISCAL - Wolfgang Schreiner

Tutorial: Mathematical Model Checking in RISCAL

Abstract

Model checking is a technique that is well established in computer science for verifying the correctness of finite state systems (i.e., models of hardware or software systems with finite state spaces); the verification is performed with respect to specific safety properties such as the absence of runtime errors or with respect of general correctness properties that are typically specified in a variant of temporal logic. The principal advantage of model checking is that it is a fully automatic technique and demonstrates the violation of a property by a concrete countexample run.In this tutorial, we demonstrate how the RISCAL software can be utilized to enjoy similar benefits in a more general context, namely the design and analysis of mathematical theories over discrete domains and the specification and verification of algorithms that solve problems in these theories. RISCAL is a “mathematical model checker” based on a statically typed variant of first-order logic and set theory where all domains have parameterized but finite sizes. This allows to validate (respectively falsify) conjectures and problem solutions in specific small domains, before attempting to verify by proof their general correctness for domains of arbitrary size.We demonstrate these ideas by modeling and analyzing in live demonstrations example problems from various areas of discrete mathematics, algebra, and logic. The RISCAL software is freely available and the demonstration examples can be downloaded from the RISCAL web site (https://www.risc.jku.at/research/formal/software/RISCAL).

Location: Room 1
15:00-15:20Coffee Break
15:20-17:20 Session 12A: Distributed Computing Session + Theory of Computing Session
Location: Room 1
15:20
Proof of Computation (abstract)
15:40
Quantitative Programming and Markov Decision Processes (abstract)
16:00
Empirical evaluation of LZW-Compressed Multiple Pattern Matching Algorithms (abstract)
16:20
Deciding Whether two Codes Have the Same Ambiguities is in co-NP (abstract)
16:40
On the bases of Z^n lattice (abstract)
17:00
Fully-adaptive Model for Broadcasting with Universal Lists (abstract)
15:20-17:00 Session 12B: Special Session for PhD students (2)
Location: Room 2
15:20
Reducing Adversarial Vulnerability Using GANs (abstract)
15:40
Obfuscation Techniques Based on Random Strings Used in Malicious VBA Scripts (abstract)
16:00
On Technical and Legislative Challenges for Blockchain-Focused Fraud Detection (abstract)
16:20
One side class SVM training methods for malware detection (abstract)
16:40
Building a Machine Learning Model for Malware Detection from Ground Zero (abstract)
15:20-17:20 Session 12C: Workshop on Iterative algorithms for approximating fixed points of various contractive type operators (1)
Location: Room 3
15:20
A new class of nonlinear operators and fixed point convergence using K iteration process (abstract)
15:40
Quasi, enriched, and admissible perturbations for some classes of operators in the iterative approximation of fixed points (abstract)
16:00
On a M\u aru\s ster problem in the iterative approximations of fixed points for demicontractive operators (abstract)
16:20
Kannan and Bianchini fixed point theorems in partially ordered H-distance space (abstract)
16:40
Weak Convergence Teorems for Inertial Krasnoselskii-Mann Iterations in the class of enriched nonexpansive operators in Hilbert Spaces (abstract)
17:00
On some fixed point theorems for Ciric operators (abstract)
17:20-17:40Coffee Break
17:40-19:00 Session 13A: Artificial Intelligence Session (1)
Location: Room 1
17:40
Building customized Named Entity Recognition models for specific process automation tasks (abstract)
PRESENTER: Vasile Ionut Iga
18:00
Unsupervised Extractive Summarization with BERT (abstract)
18:20
FB-RO-Offense - A Romanian Dataset and Baseline Models for detecting Offensive Language in Facebook Comments (abstract)
PRESENTER: Andrei Paraschiv
18:40
Exploring the potential of prototype-based soft-labels data distillation for imbalanced data classification (abstract)
17:40-19:00 Session 13B: Special Session for PhD students (3)
Location: Room 2
17:40
Cerebral Metastases Segmentation using Transfer Gliomas Learning and GrabCut (abstract)
18:00
Astronomical Object Detection Using Artificial Intelligence (abstract)
18:20
Game Digger Creating an adaptive recommender system (abstract)
17:40-19:00 Session 13C: Workshop on Iterative algorithms for approximating fixed points of various contractive type operators (2)
Location: Room 3
17:40
Fixed points of multivalued b-enriched multivalued nonexpansive mappings and *-b-enriched nonexpansive mappings (abstract)
18:00
Common fixed point theorems for enriched Jungck contractions in convex metric spaces (abstract)
18:20
Synchronous and Asynchronous cyclic contractions (abstract)
18:40
An integral type fixed point theorem (abstract)
Wednesday, September 14th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 14A: Tutorial: Application, Analysis, and Development of Metaheuristic Algorithms with HeuristicLab, an Open-source Optimization Environment for Research and Education - Stefan Wagner

Tutorial: Application, Analysis, and Development of Metaheuristic Algorithms with HeuristicLab, an Open-source Optimization Environment for Research and Education 

Abstract:

HeuristicLab [1, 2] is an open-source environment for heuristic optimization that features several metaheuristic optimization algorithms as well as optimization problems. It is developed by the research group Heuristic and Evolutionary Algorithms Laboratory (HEAL) [3] of the University of Applied Sciences Upper Austria and is based on C# and Microsoft .NET. HeuristicLab is used as development platform for several research and industry projects (for example the Josef Ressel Centers SymReg [4] and adaptOp [5]) as well as for teaching metaheuristics in the study programs Software Engineering and Medical- and Bioinformatics in Hagenberg. Over the years HeuristicLab has become more and more known within the metaheuristic optimization community and is used by researchers and lecturers at different universities worldwide. This tutorial demonstrates how to apply, analyze, and develop metaheuristic optimization algorithms using HeuristicLab [1, 2]. It will be shown how to parameterize and execute evolutionary algorithms to solve combinatorial optimization problems (routing, scheduling) as well as data analysis problems (regression, classification). Participants will learn how to assemble different algorithms and parameter settings to a large-scale optimization experiment and how to execute such experiments on multi-core or cluster systems. Furthermore, the experiment results will be compared using HeuristicLab’s interactive charts for visual and statistical analysis to gain knowledge from the executed test runs. To complete the tutorial, it will be sketched briefly how HeuristicLab can be extended with further optimization problems and how custom optimization algorithms can be developed.

[1] https://dev.heuristiclab.com 

[2] https://github.com/heal-research/HeuristicLab 

[3] https://heal.heuristiclab.com 

[4] https://www.symreg.at

[5] https://www.adaptop.at

Location: Room 1
09:00-10:30 Session 14B: Tutorial: Conditional Rewriting in Theorema 2.0 - Wolfgang Windsteiger

Tutorial: Conditional Rewriting in Theorema 2.0

Abstract

The Theorema system is a proof assistant based on Mathematica, one of the leading systems (not only) symbolic computation.The main aim of Theorema is “natural style”, both in input and in output. From Mathematicawe mainly use its highly programmable notebook interface and the pattern-based programming language. In contrast to other provers in and around the Wolfram/Mathematica-ecosystem, Theorema’s logical engine guiding the proofs does not use any of Mathematica’s builtin algorithms for manipulating symbolic expressions, but has its own language for predicate logic and a proof calculus similar to natural deduction in order to automatically generate human-like proofs. In this tutorial, we want to focus on conditional rewriting and explain its implementation and its applications in the frame of Theorema 2.0. The tutorial will mainly be based on a live demo of the system showing concrete examples of proofs as they are used in teaching logic with the help of Theorema.

Location: Room 2
10:30-10:50Coffee Break
10:50-11:50 Session 15A: Logic and Programming Session
Location: Room 1
10:50
FERPModels: A Certification Framework for Expansion-Based QBF Solving (abstract)
11:10
IPO-MAXSAT: The In-Parameter-Order Strategy combined with MaxSAT solving for Covering Array Generation (abstract)
11:30
Maslov’s Inverse Method and Favorable M-sequent Calculus (abstract)
10:50-11:50 Session 15B: Workshop on Agents for Complex Systems + PhD Session
Location: Room 2
10:50
Intelligent Agent for Food Recognition in a Smart Fridge (abstract)
11:10
Machine Learning Models to Predict Soil Moisture for Irrigation Schedule (online) (abstract)
11:30
Data cleansing in Continuous Glucose Monitor time series (abstract)
PRESENTER: Bogdan Butunoi
12:00-13:30Lunch Break
13:30-14:20 Session 16: Invited talk: Implementation Techniques for Mathematical Model Checking - Wolfgang Schreiner

Invited talk:  Implementation Techniques for Mathematical Model Checking

Abstract

The aim of the RISCAL software is the analysis of theories and algorithms over discrete domains as they arise in computer science, discrete mathematics, logic, and algebra. For this purpose, RISCAL provides an expressive specification language based on a strongly typed variant of first-order logic with a rich set of types and operations in which theories can be formulated and algorithms can be specified; nevertheless the validity of all formulas and the correctness of all algorithms is decidable. This is because all RISCAL types have finite sizes and thus the underlying model is finite; the sizes of the types and thus of the model is configurable by model parameters. RISCAL thus represents a tool for the automated validation and (more important) falsification of conjectures, in order to avoid fruitless attempts to prove invalid statements. The system has been mainly developed for educational purposes but it also has been applied in research.

In this talk, we present and compare the various decision techniques that have been applied in the implementation of RISCAL. The original implementation was based on “semantic evaluation” where all syntactic phrases of the specification language were translated into an executable representation of their (generally nondeterministic) denotational semantics; while this mechanism is reasonably efficient, its main advantage is actually its transparency: it gives easily rise to visual representations of the semantics and to the generation of counterexamples for invalid conjectures. Later (by Franz-Xaver Reichl), an alternative decision mechanism was developed in the form of a translation of RISCAL into the SMT-LIB theory QF_UFBV (unquantified formulas over bit vectors with uninterpreted sort and function symbols) which can be decided by various SMT solvers. While this decision mechanism is generally much more efficient and allows the analysis of much larger domains, there are also situations when it is inferior to the semantics-based approach; we discuss the pros and cons of both approaches based on both synthetic and real-world benchmarks.

These techniques are complemented by the recent addition of an implementation (by Ágoston Sütő) of the verification of transition systems with respect to linear temporal logic specifications by their translation to finite automata.

Location: Room 1
14:20-14:40Coffee Break
14:40-16:00 Session 17A: Special session Computer Algebra and Computational Logic (1)
Location: Room 1
14:40
Approaches to the Skolem Problem
15:20
Proving properties of linear operators via ideal membership of noncommutative polynomials
14:40-16:00 Session 17B: Workshop on Digital Image Processing for Medical and Automotive Industry (1)
Location: Room 2
14:40
Learning networks hyper-parameter using multi-objective optimization of statistical performance metrics (abstract)
15:00
Improving the Diagnostic of Contrast Enhanced Ultrasound Imaging using Optical Flow for Lesion (abstract)
15:20
AI-based healthcare application for medical image processing and diagnosis prediction (abstract)
15:40
Hardware-software co-design (abstract)
16:00-16:20Coffee Break
16:20-17:40 Session 18A: Workshop on Digital Image Processing for Medical and Automotive Industry (2)
Chair:
Location: Room 2
16:20
Eye Detection For Drivers Using Convolutional Neural Networks With Automatically Generated Ground Truth Data (abstract)
16:40
Pedestrian Trajectory Prediction Based on Tree Method using Graph Neural Networks (abstract)
17:00
Semi-Supervised Pipeline for Human Sprites Neural Rendering (abstract)
17:20
Motorage - Computer vision-based self-sufficient smart parking system (abstract)
16:20-17:40 Session 18B: Special session on Computer Algebra and Computational Logic (2)
Location: Room 1
16:20
Proofs by Induction in a Saturation Theorem Prover (abstract)
17:00
Why is quantifier elimination doubly exponential?
Thursday, September 15th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 19: Tutorial: Natural Language Processing for Industrial Applications - Markus Steindl and Sandra Wartner

Tutorial: Natural Language Processing for Industrial Applications

Tutorial summary

After completing this tutorial session you will…

  • …know how computers process human language
  • …know the most common NLP-tasks and how to create value for your use-case
  • …be aware about challenges and possible solutions
  • …have an overview of the NLP-toolbox (models, python libraries and other resources) and how to get started
Location: Room 1
10:30-10:50Coffee Break
10:50-12:30 Session 20: Artificial Intelligence Session (2)
Location: Room 2
10:50
Accelerating heuristic convergence on the "Evolution of Mona Lisa" problem by including image-centric mutation operators (abstract)
11:10
The Impact of Convolutional Neural Network Parameters in the Binary Classification of Mammograms (abstract)
11:30
An Ant Colony Optimization Approach to the Densest $k$-Subgraph Problem (abstract)
11:50
Advantages of a neuro-symbolic solution for monitoring IT infrastructures alerts (abstract)
12:10
Evaluation of Class Activation Methods for Understanding Image Classification Tasks (abstract)
12:30-14:00Lunch Break
14:00-14:50 Session 21: Invited talk: Complex Network Analysis using AI algorithms - Camelia Chira

Invited talk: Complex Network Analysis using AI algorithms

Abstract

The network science field has witnessed a tremendous growth in recent years due to the increasing availability of massive datasets modelled using complex networks, the advances made in the field of Artificial Intelligence (AI) and the demonstrated successes of network-based theories in domains such as biology, engineering, health and social sciences. Networks provide powerful models for the analysis and understanding of complex phenomena, offering a new perspective on data by creating structures and links that can be visualized and analysed using specialized algorithms. Nevertheless, networks pose significant challenges related to system functionality through node interactions, understanding network processes and predicting behaviour.

This talk provides an introduction to the network science field, covering important tasks in complex network analysis, including the identification of important nodes in the network, outlining the cycles and relevant paths in the network, detection of communities and network dynamics. For each of these problems, relevant methods and AI algorithms will be presented and discussed based on real examples and results for different types of networks.

Location: Room 1
14:50-15:10Coffee Break
15:10-16:50 Session 22: Artificial Intelligence Session (3)
Location: Room 1
15:10
Fact-checking with explanations (abstract)
15:30
Automatic Wound Assessment Using 2D Photos and Mapping onto Patient-specific 3D Models (abstract)
15:50
Using N-Gram Variations in Static Analysis for Malware Detection (abstract)
16:10
Proof of Concept for a Roundtrip Engineering IS for the New Enterprise in the Industry 4.0 Era (abstract)
16:30
Authors and Collaborator Groups Ranking Analysis on SYNASC using Centrality Measures (abstract)