Program
Online
May 29
09:30-09:35 |
Welcome Speech |
09:35-10:35 |
Invited Talk |
09:35-10:35 |
Query Processing in Modern Analytical DBMS |
10:35-11:05 |
Coffee Break |
11:05-12:05 |
Software Verification |
11:05-11:20 |
[ONLINE] Bounding Thread Switches in Dynamic Analysis of Multithreaded Programs |
11:20-11:35 |
[ONLINE] Leveraging Colored Symbolic Memory Graphs for Detecting DRM-Specific Errors in Linux Drivers |
11:35-11:50 |
DIFFuzzer: Detecting File System Errors with Differential Grey-box Fuzzing |
11:50-12:50 |
Specification Languages and Language Processing Tools |
11:50-12:05 |
[ONLINE] Converting User Specifications into Executable Program Code |
12:05-12:20 |
[ONLINE] Development of a Method for Formalizing Requirements to Improve Compliance with User Expectations of an Information System |
12:20-12:35 |
[ONLINE] Designing Refactoring Tool for Object-Oriented Code Based on Metrics |
12:35-12:50 |
PereFlex: A Tool for Automated Evaluation of Error Recovery in Parsers |
12:50-13:10 |
Poster Announcements (2 minutes per poster) Automated Code Evaluation System for Programming Education: Integrating Static Analysis and Machine Learning AI-Game Algorithms Vectorization for Calculation Optimization on RISC-V Architecture Software Engineering of the AI-based Analytics for Industrial Air Emissions Forecasting Methods of Identifying Fake News in the Information Space A Vulnerability Detection Module in Cloud Storage Virtualization Systems Detection of SQL Injections into the Network Using Machine Learning Methods Game Engines, Benchmarks and 3D Modeling Software Machine Learning Methods for Detecting Phishing Domains Machine Learning Methods for Detecting Attacks on TCAB Text Classification Research and Use of Machine Learning Algorithms to Detect Fraudulent Websites Comparative Analysis of Machine Learning Methods for Solving the Problem of Predicting Failures in Gas Turbine Engines |
13:10-14:05 |
Lunch |
14:05-14:35 |
Poster Session |
14:35-15:35 |
Digital Hardware Synthesis and Analysis |
14:35-14:50 |
Correlation Identification of NPN-4 Classes Distributions in Optimization of Logic Circuits |
14:50-15:05 |
Optimization in Logic Synthesis: Scaling up the Known Method |
15:05-15:20 |
Methods of Super-Cell Generation for Technology Mapping |
15:20-15:35 |
Application of SVAN Static Analysis Tool for Functional Verification of Open RTL Models |
15:35-16:35 |
Computer Networks and Cloud Computing |
15:35-15:50 |
A Machine Learning Methods for Detecting Network Attacks |
15:50-16:05 |
RTT Prediction using Offline and Online Learning |
16:05-16:20 |
[ONLINE] The Dynamic Adaptive Packet Buffering (DAPB) Algorithm for Service Mesh Performance Enhancement Based on eBPF |
16:20-16:35 |
An Approach for Horizontal Scaling of Simulation Model Execution in Cloud Environment |
16:35-17:05 |
Coffee Break |
17:05-18:05 |
Application-Specific Language and Tools (1) |
17:05-17:20 |
Generating Compact Residue Number Systems Bases |
17:20-17:35 |
Combining Logical Reasoning and LLMs Toward Creating Multi-Agent Smart Home Systems |
17:35-17:50 |
[ONLINE] A Distributed Framework for Large-Scale Data Analysis Using Bio-Inspired Sensory-Motor Algorithms |
17:50-18:05 |
Vision Language Models Quantization |
18:30-22:00 |
May 30
09:30-10:30 |
Tutorial |
09:30-10:30 |
Designing Prompts for Software Engineering Tasks: A Practical Route |
10:30-11:00 |
Coffee Break |
11:00-12:00 |
AI in Software Engineering |
11:00-11:15 |
Advanced Type Inference Techniques for Python Using Large Language Models |
11:15-11:30 |
An Approach to LLM-based Code Completion for Python |
11:30-11:45 |
A Preliminary Analysis of Prompt Engineering in Large Language Models for Code Generation |
11:45-12:00 |
[ONLINE] Generating and Debugging Java Code using LLMs based on Associative Recurrent Memory |
12:00-13:00 |
System Programming |
12:00-12:15 |
Architecture for Time Synchronization in an Onboard SpaceWire Network of ARINC 653 Nodes |
12:15-12:30 |
Development of Logbook System for Real-Time Operating System |
12:30-12:45 |
Improving Image Analysis and Processing Performance on the RISC-V Platform with Lichee Pi 4A |
12:45-13:00 |
Using Software-Defined Performance Counters to Construct a GPU Power Consumption Model |
13:00-14:00 |
Lunch |
14:00-14:30 |
Round Table on Security-by-Design |
14:30-15:30 |
Petri Nets |
14:30-14:45 |
Relaxed Lazy Soundness Verification for Data Petri Nets |
14:45-15:00 |
A Tool for Implementation and Analysis of Petri Net Unfolding Algorithms |
15:00-15:15 |
Evaluating Structural Complexity of Workflow Nets Modeling Asynchronous Agent Interactions |
15:15-15:30 |
[ONLINE] Analysis of Processes Represented by UML Diagrams Using Petri Nets |
15:30-16:15 |
Application-Specific Language and Tools (2) |
15:30-15:45 |
Modification of the Smith-Waterman Algorithm for Local Alignment of Genetic Sequences Based on the Sliding-Window Method |
15:45-16:00 |
[ONLINE] Comparative Analysis of Requirements Prioritization Methods for Personalized Nutrition Web Applications |
16:00-16:15 |
[ONLINE] Integrating Ontology-Based Approach to Data Visualization and AI-Driven Plotly Visualization |
16:15-16:45 |
Coffee Break |
16:45-17:30 |
Application-Specific Language and Tools (2), continuation |
16:45-17:00 |
[ONLINE] AI-Assistant Development and Integration into Learning Management System |
17:00-17:15 |
[ONLINE] The Process Optimization of Human Body Movements Tracking Based on Data from Virtual Cameras on a 3D Scene |
17:15-17:30 |
Development of Knowledge-based Intelligence for Sustainability Assessment of Russian Regions |
18:00-20:00 |
Excursion |
May 31
09:30-15:00 |
Excursion to Mashuk |