Austrian Computer Science Day 2025
06.06.2025
The ACSD is an annual event that brings together computer scientists from all over Austria. The day serves as networking opportunity, a day to exchange research ideas and introduces new and established talents.
ACSD 2025 will take place all day on Friday 6 June in the Aula and we are particularly pleased to announce Bruno Buchberger, an ‘Innsbrucker’ with an international reputation, as keynote speaker.
In addition to the keynote speech, Austrian research colleagues will present their current research results and young talents will draw our attention. Specifically, we will have 12 focus talks by experienced colleagues and young academics, respectively. For PhD students there will be a “Minute Madness” and a poster presentation to present their research ideas.
Register here for the ACSD 2025
(Registration deadline: 28.05.25)
Program
08:30 - 09:00
Registration
09:00 - 10:00
Opening, Keynote by Bruno Buchberger: "Looking Back and Ahead to “Thinking Machines"
Will computer science Ph.D. students and professors soon be replaced by “thinking machines”? - I did my Ph.D. in Innsbruck in 1966 (with the invention of the algorithmic theory of “Gröbner Bases”), and I was a professor most time of my life (at the Johannes Kepler University in Linz). In 2004, I managed to generate the algorithmic idea of Gröbner bases by an algorithm invention algorithm. Recent LLM technology promises much more (?). Fortunately, a Ph.D. student in 1931 (Kurt Gödel), 10 years before the first thinking machines were physically built, showed by “pure thinking” that future mathematicians and computer scientists would never be jobless! – From the various adventures and stages in my life as a Ph.D. student, professor, and technology manager, I will derive some conclusions for the future careers of computer science Ph.D. students and junior and senior professors. Speaking at the place where I experienced the excitement of studying mathematics at the dawn of the computer age and working as one of the first programmers on the university’s first computer (a ZUSE Z23), I probably will not be able to avoid getting emotional.
At the age of 23, in his Ph.D. thesis at the University of Innsbruck, Austria, he invented the theory of “Groebner Bases“, a general algorithmic method for handling multivariate polynomial systems. The theory has numerous applications in robotics, cryptography, hardware design, automated reasoning, etc., and is now a standard tool in all major mathematical software systems like Mathematica, Maple, GeoGebra, etc.. “Gröbner Bases” is now also an extra entry in the AMS Mathematical Subject Classifcation Index (13P10).
His current research focuses on the next level of AI, which combines symbolic computation, notably the automated reasoning methods in his Theorema system, with machine learning.
Buchberger founded the Journal of Symbolic Computation, the Research Institute for Symbolic Computation (RISC), the Softwarepark Hagenberg, and the University of Applied Sciences in Hagenberg.
His awards include six honorary doctorates in Europe, the UK, and Canada); membership in the Academy of Europe; the ACM Kanellakis Award for Theory and Practice (2008), the Herbrand Award for Automated Reasoning (2018, CADE), and Austrian of the Year in Research (2010).
10:00 - 11:00
Research Talks
- Florian Zuleger (TU Vienna): "Automated Complexity Analysis"
In this talk, I will overview different approaches for the automated computational complexity analysis of programs. (1) The size-change principle suggests to abstract the transitions of a program in terms of inequalities over integer-valued expressions on the program state. I discuss how to analyze the computational complexity of such size-change abstracted programs in terms of weighted automata. (2) Vector addition systems are an equivalent representation of petri nets and a fundamental model in theoretical computer science. I will discuss decidability and expressivity results for the analysis of these systems. (3) I will present a constraint-based approach for the automated complexity analysis of functional programs. The approach is based on potential function templates with unknown coefficients. This work targets the analysis of self-adjusting data structures such as (randomized) splay trees, which requires sophisticated potential functions that include logarithmic expressions.
- Ana Sokolova (Paris Lodron University Salzburg): "ϵ-Bisimulation and ϵ-Distance for Probabilistic Systems"
Behaviour distances have been studied as quantitative semantical counterpart to behavioural equivalences like bisimilarity. Instead of proving that states in probabilistic transition systems behave equivalently, they quantify how different/similar such states are. The most studied and accepted behaviour distance is one based on the Kantorovich distance between distributions. It comes with many beautiful theoretical results. Another one, ϵ-distance is based on ϵ-bisimilarity, an approximate notion of behavioural equivalence that unifies both worlds: it gives an equivalence that relates states at distance at most ϵ. This distance has the advantages that it is intuitively easy to understand, relates systems that have close probabilities even if these differences can imply very different behaviour in the long run (for example, an imperfect implementation is close to its specification), and it is easy to compute. However, until recently it was not clear whether this distance shares any of the nice properties of the Kantorovich-based distance. Recently, together with Joseé Desharnais, we showed that ϵ-distance indeed shares the useful properties of the Kantorovich distance, most notably it is the greatest fixpoint of a suitable functional. At the core of these results is the observation that replacing the Kantorovich distance with the Lévy-Prokhorov distance on distributions yields ϵ-distance. In addition, we see that ϵ-bisimulations have an appealing coalgebraic characterization.
- Lorenzo Ciardo (University of Oxford): "Quantum vs. classical chromatic number of graphs"
Quantum pseudo-telepathy lies at the core of Bell's Theorem on the incompatibility of quantum mechanics with local hidden-variable theories. In the language of two-player one-round games, this phenomenon occurs when the availability of quantum resources in the form of shared entanglement results in non-classical correlations between the players' answers, which allow outperforming any classical strategy. In this talk, I will focus on the quantum chromatic number---the natural quantum counterpart of the classical chromatic number of graphs, introduced in [Cameron--Montanaro--Newman--Severini--Winter'07]. An exponential lower bound is known for the maximum gap between quantum and classical chromatic number, which measures the pseudo-telepathy of the graph-colouring game. I will show that, conditional to the quantum pseudo-telepathy variants of Khot's d-to-1 Conjecture [Khot'02] and Håstad's inapproximability of linear equations [Håstad'01], the gap is unbounded. The proof of this result hinges on an algebraic connection between the occurrence of quantum pseudo-telepathy and the computational complexity of constraint satisfaction problems. In addition, I will present an (unconditional) upper bound on the gap in the case of entanglement resources of fixed dimension, coming from joint work with Demian Banakh, Marcin Kozik, and Jan Tułowiecki on the simulation of perfect quantum strategies for two-player games via classical communication channels of fixed size.
11:00 - 11:30
Coffee Break
11:30 - 12:30
Research Talks
- Karen Azari (University of Vienna): "On the Provable Security of Prefix-constrained Pseudorandom Functions "
In the field of cryptography, we propose protocols that provide strong provable security guarantees, that is, one can mathematically prove that attacks against the scheme are impossible, or at least as hard to achieve as solving a computational problem that mathematicians failed to solve despite extensive research. When analyzing a more involved scheme that is based on several simpler cryptographic primitives, we prove that any attack against the scheme implies an attack against one of the underlying building blocks, where security of the building blocks in turn is based on mathematical hardness assumptions. In this talk, I will discuss the difficulty of proving security of so-called constrained pseudorandom functions (CPRFs).
A CPRF is a PRF with the following additional functionality: Given the secret key and a constraint, one can generate a constrained key which allows to evaluate the PRF on all inputs satisfying the constraint. For security, one requires that the function output on inputs not satisfying the constraint should remain pseudorandom. A prominent example of a CPRF is the construction of Goldreich, Goldwasser and Micali [GGM84], which supports prefix constraints and is based on pseudorandom generators. While selective security, where the adversary has to commit to its choices in the beginning of the security experiment, is relatively easy to prove for the GGM CPRF, it remained open to prove the stronger notion of adaptive security, where the adversary is allowed to make its choices on-the-fly, depending on what they learn during the game. I will discuss the difficulty of proving adaptive security of the GGM PRF and provide a very brief intuition on how we could finally solve the problem using a new rewinding proof technique.
- Daniel Arp (TU Vienna): "Lessons Learned in Mobile Malware Detection with Machine Learning"
Mobile malware continues to pose a serious threat to the security and privacy of mobile device users. In response, the research community has developed a wide range of machine learning-based detection approaches over the past decade, aiming to overcome the limitations of traditional signature-based techniques. While these learning-based methods have demonstrated strong potential, the field still faces a number of unresolved challenges—such as concept drift and evolving adversarial behaviors—that must be addressed to ensure sustained effectiveness in real-world environments. In this talk, we reflect on a decade of research in machine learning-based mobile malware detection, discuss key lessons learned, and highlight ongoing challenges that present opportunities for future work.
- Erich Kobler (JKU): "DEALing with Image Reconstruction: Deep Attentive Least Squares"
State-of-the-art image reconstruction often relies on complex, highly parameterized deep architectures. We propose an alternative: a data-driven reconstruction method inspired by the classic Tikhonov regularization. Our approach iteratively refines intermediate reconstructions by solving a sequence of quadratic problems. These updates have two key components: (i) learned filters to extract salient image features, and (ii) an attention mechanism that locally adjusts the penalty of filter responses. Thereby, it achieves performance on par with leading plug-and-play and learned regularizer approaches while offering interpretability, robustness, and convergent behavior. In effect, we bridge traditional regularization and deep learning with a principled reconstruction approach.
12:30 - 12:50
Minute Madness
- Randomness meets Functional Programming (Matthias Hetzenberger, TU Vienna)
- Emotion-Based Music Recommendation (Marta Moscati, JKU Linz)
- Enterprise Architecture as a Strategic Enabler for Digital Twin Development (Marianne Schnellmann, TU Vienna)
- Counterfactual Explanations for Recommendation (Amir Reza-Mohamadi, University of Innsbruck)
- The Art of Doing Less in Scaling Probabilistic Data Models to Billions of Parameters (Till Kahlke, University of Oldenburg)
- Gröbner Basis Analysis and Shape Lemma: Algebraic cryptanalysis of Anemoi (Luca Campa, University of Innsbruck)
- Enhancing Conceptual Modeling through Multimodal Data Analysis and Mixed Reality (Aleksandar Gavric, TU Vienna)
- Stabilizer Tableaus for the Efficient Simulation of Qudit Clifford Circuits (Nina Brandl, JKU Linz)
- Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks (Nora Hofer, University of Innsbruck)
- Evidence for Rich Probabilistic Inference in Visual Processing Using Discrete Latents (Yidi Ke, University of Oldenburg)
- Automated Amortized Analysis of Leftist Heaps (Armin Walch, University of Innsbruck)
12:50 - 14:15
Lunch Break
Poster Session
14:15 - 15:15
Research Talks
- Richard Küng (JKU Linz): "Scalable quantum-classical interfaces and their applications to learning in the quantum realm "
Large-scale quantum (computing) experiments do not work in isolation. Substantial classical computing power is required to control the architecture and process its results. This necessarily creates information-transmission bottlenecks at the interface between quantum and classical realms.
I will present quantum-classical interfaces that address these information-transmission bottlenecks. Dubbed classical shadows (of quantum systems), these leverage frame theory and high-dimensional probability theory to obtain a succinct classical description of the underlying quantum system. These can then be used to efficiently predict many features of the quantum system in a streaming fashion. Building on these ideas, we also establish mathematically rigorous synergies between quantum experiments (to obtain data) and machine learning (to learn how to make predictions).
- Jörg Lücke (University of Oldenburg/Universität Innsbruck): "Variational Optimization for Big and for Smart Machine Learning Models"
Artificial Intelligence (AI) accomplishes tasks that have previously been reserved for biological intelligence. One of the current observations is that AI systems become increasingly capable because they (A) can be scaled to large sizes, and (B) can be trained on Big Data. But there are also many downsides of current, large-scale AI models that are intensively discussed. One major disadvantage is their ever increasing energy consumption. In my talk I will focus on alternative training technology for Machine Learning (ML) models with a focus on probabilistic models for unsupervised learning. I will highlight important optimization techniques that represent alternatives to mainstream approaches especially for limited data, for difficult data but also for Big Data. Advantages of the resulting ML algorithms in terms interpretability, capabilities and training efficiency will be discussed. As an outlook, I will argue that novel training technology is, in general, likely to be a significant factor for next generation AI systems.
- Chitchanok Chuengsatiansup (AAU): "Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures"
How will future microarchitectures impact the security of existing cryptographic implementations? As we cannot keep reducing the size of transistors, chip vendors have started developing new microarchitectural optimizations to speed up computation. A recent study (Sanchez Vicarte et al., ISCA 2021) suggests that these optimizations might open the Pandora’s box of microarchitectural attacks. However, there is little guidance on how to evaluate the security impact of future optimization proposals. To help chip vendors explore the impact of microarchitectural optimizations on cryptographic implementations, we develop (i) an expressive domain-specific language, called LmSpec, that allows them to specify the leakage model for the given optimization and (ii) a testing framework, called LmTest, to automatically detect leaks under the specified leakage model within the given implementation. Using this framework, we conduct an empirical study of 18 proposed microarchitectural optimizations on 25 implementations of eight cryptographic primitives in five popular libraries. We find that every implementation would contain secret-dependent leaks, sometimes sufficient to recover a victim’s secret key, if these optimizations were realized. Ironically, some leaks are possible only because of coding idioms used to prevent leaks under the standard constant-time model.
15:15 - 15:45
Coffee Break
15:45 - 16:45
Research Talks
- Radu Prodan (University of Klagenfurt/University of Innsbruck): "Graph-Massivizer: A holistic neuro-symbolic platform for scalable and sustainable graph processing of extreme data"
Graph-Massivizer (https://graph-massivizer.eu/) is a Horizon Europe project coordinated by the University of Klagenfurt that researches and develops a holistic neuro-symbolic platform for processing and analytics of extreme data represented as semantic knowledge graphs with billions of nodes and edges. The talk presents a case study of using the platform for anomaly prediction in the CINECA supercomputing center using graph neural networks supported by machine learning-driven sampling algorithms for scalable training and inference on resource-constrained devices.
- Franceso Locatello (ISTA): "Causal Learning: Representations, discovery, and Inference"
In this talk, I will discuss opportunities and challenges in discovering latent structure and causal relations from data using machine learning. I will introduce three key areas of causality research: causal reasoning, causal discovery, and causal representations. I will relate each one to methodologies in machine learning and show how advances in the latter enable new generations of algorithms. As an exemplar application of causal reasoning and representations, I will present results toward accelerating scientific discovery in real-world experimental ecology.
- Jürgen Cito (TU Vienna): "Evaluating Agent-based Program Repair: A Case Study at Google "
Agent-based program repair promises end-to-end bug fixing by combining planning, tool use, and code generation via large language models. While prior work has focused on open-source benchmarks like SWE-Bench, we explore the viability of such approaches in an enterprise context using a curated dataset of 178 real-world bugs from Google’s issue tracker—78 human-reported and 100 machine-reported. We present Passerine, an agent adapted to Google’s development environment, and evaluate its performance. Passerine achieves plausible fixes for 73% of machine-reported and 25.6% of human-reported bugs, with 43% and 17.9% of these being semantically equivalent to the ground truth. Our results establish a baseline for agentic repair in industrial settings, highlighting key differences from public benchmarks.
Venue
The Austrian Computer Science Day will take place in the Aula of the University of Innsbruck, Innrain 52, 1st floor.
Getting there
Organization
Organizing Committee
- Georg Moser (georg.moser@uibk.ac.at)
- Eva Zangerle (eva.zangerle@uibk.ac.at)
ACSD Steering Committee
- Roderick Bloem
- Christoph Kirsch
- Krysztof Pietrzak
- Claudia Plant
- Thomas Pock
- Bernhard Rinner
- Georg Weissenbacher
Call for Posters
We warmly invite PhD students from all Austrian universities and research institutions to present their exciting research at the upcoming Austrian Computer Science Day (ACSD), a vibrant networking event for our nation's computer science community. ACSD is a unique opportunity for PhD students to showcase their work, engage with peers and senior experts. Join us to exchange ideas, explore collaborations, and get inspired by cutting-edge research across all areas of computer science.
We encourage poster submissions on any computer science topic. This call for posters is especially aimed at PhD students, providing them with a valuable opportunity to introduce themselves to the Austrian scientific community, showcase their research topics, and engage in constructive discussions and networking.
Important Details
Registration: Attendance is free, but registration is mandatory for all presenters and participants.
Submission: Simply send the title of your poster by email to Eva Zangerle. No further submission is required.
Submission Deadline: May 15, 2025
Questions?
For any questions or further information, please feel free to reach out to Eva Zangerle.
We can't wait to see your posters and welcome you to an engaging Austrian Computer Science Day! No further submission is required.
Budget Accomodations
Innrain 16
6020 Innsbruck
info@basic-hotel.at
www.basic-hotel.at
Mariahilferstrasse 6
6020 Innsbruck
office@mondschein.at
www.mondschein.at
Blasius-Hueber-Strasse 4
6020 Innsbruck
Buchungscode: UNIINN2025
www.meininger-hotels.com
Sponsorships