Preliminary program

This is a preliminary program, the right to make changes is reserved.

Wednesday, July 1

10:00 - 10:40
Analysis Methods (2 papers)
  • Aleksandr Samedov and Tamás Kozsik - Experiments on the Energy Efficiency of Static Analysis
  • Abbas Alharan, István Kósa, Brigitta Szálka and István Vassányi - Mining dietary harmony rules from user logs for automated meal plan generation
10:40 - 11:10 Coffee Break
11:10 - 12:00 Invited Talk - Gergely Ambrus
12:00 - 12:10 Group photo before lunch
12:10 - 14:30 Lunch - Cheers Bar (Gathering in front of the Bolyai Institute at 12:10)
14:30 - 15:50
Artifical Intelligence 1 (5 papers)
  • Szolnoki Norbert Sándor and Gábor Antal - Fine-Tuning CodeBERT-Java for Method-Level Bug Detection on Defects4J
  • Nándor Ákos Vincze and Balázs Bánhelyi - Reliable Parking Trajectory Prediction with Verifiable Neural Networks
  • Zahra Delavari - AI Agent-based Approach for Enhancing Urban Mobility Applications
  • Balázs Ádám Toldi, András Földvári, András Pataricza and Zsigmond Pap - Deterministic Diagnostics for Highly Configurable 5G Networks Using Inductive Learning
  • Vivien Vörös, Gábor Antal and Péter Hegedűs - Comparing Large Language Models for Automated Vulnerability Repair under a Fixed Prompting Strategy
15:50 - 16:10 Coffee Break
16:10 - 17:30
Artifical Intelligence 2 (5 papers)
  • Moenes Benaissa and László József Kovács - Taxonomy and Optimization of Kolmogorov-Arnold Networks vs. Multi-Layer Perceptrons for Explainable AI
  • Hiba Adil Al-Kharsan and Robert Rajkó - Diffusion-Based Feature Denoising with NNMF for Robust handwritten digit multi-class classification
  • Krisztián Pomázi and Bertalan Forstner - Meteorology-Driven Live Fuel Moisture Content Estimation at Global Scale: A Machine Learning Empirical Study Without Satellite Imagery
  • István Kolláth and Gábor Antal - Evaluating LLMs for SAST Warning Repair: An Empirical Study on VUL4J
  • Ádám Domonkos and Péter Ekler - Passive Detection of Forward Error Correction Schemes from Network Traffic

Thursday, July 2

09:40 - 10:40
Computer Graphics and Image Processing (5 papers)
  • Viktor Vad and Gábor Valasek - Point-Curve Minimal Distance via Higher Order Taylor Estimation of Footpoint Mapping
  • Hanan Namrouti, Cecília Sik-Lányi and Tibor Guzsvinecz - Memory Color Fidelity in Digital and Physical Lighting Environments: A Comparative Perceptual Study
  • Noel Nagy and Kálmán Palágyi - Fully Parallel 3D Curve-Thinning on the FCC grid with Endpoint Re-Checking
  • Gergő Papp, Emil Világos, Krisztián Szekeres and Ellák Somfai - Athlete Tracking and Identification in Water Polo
  • Anna Lili Horváth, Gábor Valasek and Csongor Csanád Karikó - Spline Proxies for Planar Level Set Distance Computations
10:40 - 11:10 Coffee Break
11:10 - 12:00 Invited Talk - Zsolt Gazdag
12:00 - 12:10 Group photo before lunch
12:10 - 14:20 Lunch - Cheers Bar (Gathering in front of the Bolyai Institute at 12:10)
14:20 - 15:50
(Parallel Sessions)
14:20 - 15:20
Application (3 papers)
  • Ádám Brand and Attila Magyar - Fuzzy Rule-Based Smart Street Lighting for Energy-Efficient Urban Illumination
  • Etele Balogh and András Kicsi - Prediction of 90-day mRS values of stroke patients based on textual care documentation
  • Róbert Nagy - Implementation and computational verification of digital signal processing pipelines for temporal light artifact measurements
14:30 - 15:50
Graphs (4 papers)
  • László Gyarmati - Optimal Object Arrangements for Star Graph Comparison Structures in the Bradley-Terry model
  • Dávid Maliga and Levente Buttyan - Design and analysis of incremental clustering algorithms for large dynamic similarity graphs
  • Péter Hajnal, Edit Pengő and István Siket - Technical Challenges in Java Symbolic Execution: Control Flow Graphs and Exception Handling Dynamics
  • Dániel Kovács and Milán Mondok - Reusing Intermediate Model Checking Results With Implicit Abstraction

Friday, July 3

09:40 - 10:40
Security and Vulnerability (5 papers)
  • Csaba Nagy, Andrea Huszti and Norbert Oláh - Blockchain-based RAG Architecture for Vulnerability Assessment
  • József Sándor, Bence Kovács and Levente Buttyán - Towards Automated Generation of Adversarial Malware Samples with a Genetic Algorithm
  • Yusufbek Sulaymonov and Veronika Szűcs - Keystroke-Based Behavioral Liveness Detection for Adaptive Multi-Factor Authentication
  • Sami Abdel-Fattah and Judit Jász - Enhancing LLM-Based Vulnerability Analysis Using Runtime-Aware Context: An Empirical Study on the Vul4J Dataset
  • Yusufbek Sulaymonov and Veronika Szűcs - Evaluating MFA Factors: A Framework for Secure and User-Friendly Authentication
10:40 - 11:10 Coffee Break
11:10 - 12:00 Invited Talk - Róbert Trényi
12:00 - 12:10 Group photo before lunch
12:10 - 14:30 Lunch - Cheers Bar (Gathering in front of the Bolyai Institute at 12:10)
14:30 - 15:50
Computation (5 papers)
  • Roland Kotroczó and János Márk Szalai-Gindl - Data Ordering for Split-Based M-tree Construction
  • Bálint Tóth and Zoltán Juhász - A High-Performance GPU-accelerated Parallel 2D Multigrid Poisson Solver
  • Bertalan Kovács, Botond Bertók and Márton Frits - Hybrid bitset-based data types for optimizing runtimes of set operations
  • Zoltán Kégli, Tamás Kozsik and Péter Rakyta - Efficient Simulation of Noise in Quantum Circuits
  • Pál Mihály - From Centralized to Distributed Digital Twins: A Review