Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by HASLab

2025

The CAOS framework for Scala: Computer-aided design of SOS

Authors
Proença, J; Edixhoven, L;

Publication
SCIENCE OF COMPUTER PROGRAMMING

Abstract
We present Caos: a programming framework for computer-aided design of structural operational semantics for formal models. This framework includes a set of Scala libraries and a workflow to produce visual and interactive diagrams that animate and provide insights over the structure and the semantics of a given abstract model with operational rules. Caos follows an approach where theoretical foundations and a practical tool are built together, as an alternative to foundations-first design (tool justifies theory) or tool-first design (foundations justify practice). The advantage of Caos is that the tool-under-development can immediately be used to automatically run numerous and sizeable examples in order to identify subtle mistakes, unexpected outcomes, and unforeseen limitations in the foundations-under-development, as early as possible. More concretely, Caos supports the quick creation of interactive websites that help the end-users better understand a new language, structure, or analysis. End-users can be research colleagues trying to understand a companion paper or students learning about a new simple language or operational semantics. We include a list of open-source projects with a web frontend supported by Caos that are used both in research and teaching contexts.

2025

Logic and Calculi for All on the occasion of Luis Barbosa's 60th birthday

Authors
Madeira, A; Oliveira, JN; Proença, J; Neves, R;

Publication
JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING

Abstract
[No abstract available]

2025

Reducing measurement costs by recycling the Hessian in adaptive variational quantum algorithms

Authors
Ramôa, M; Santos, LP; Mayhall, NJ; Barnes, E; Economou, SE;

Publication
QUANTUM SCIENCE AND TECHNOLOGY

Abstract
Adaptive protocols enable the construction of more efficient state preparation circuits in variational quantum algorithms (VQAs) by utilizing data obtained from the quantum processor during the execution of the algorithm. This idea originated with Adaptive Derivative-Assembled Problem-Tailored variational quantum eigensolver (ADAPT-VQE), an algorithm that iteratively grows the state preparation circuit operator by operator, with each new operator accompanied by a new variational parameter, and where all parameters acquired thus far are optimized in each iteration. In ADAPT-VQE and other adaptive VQAs that followed it, it has been shown that initializing parameters to their optimal values from the previous iteration speeds up convergence and avoids shallow local traps in the parameter landscape. However, no other data from the optimization performed at one iteration is carried over to the next. In this work, we propose an improved quasi-Newton optimization protocol specifically tailored to adaptive VQAs. The distinctive feature in our proposal is that approximate second derivatives of the cost function are recycled across iterations in addition to optimal parameter values. We implement a quasi-Newton optimizer where an approximation to the inverse Hessian matrix is continuously built and grown across the iterations of an adaptive VQA. The resulting algorithm has the flavor of a continuous optimization where the dimension of the search space is augmented when the gradient norm falls below a given threshold. We show that this inter-optimization exchange of second-order information leads the approximate Hessian in the state of the optimizer to be consistently closer to the exact Hessian. As a result, our method achieves a superlinear convergence rate even in situations where the typical implementation of a quasi-Newton optimizer converges only linearly. Our protocol decreases the measurement costs in implementing adaptive VQAs on quantum hardware as well as the runtime of their classical simulation.

2025

Does Every Computer Scientist Need to Know Formal Methods?

Authors
Broy, M; Brucker, AD; Fantechi, A; Gleirscher, M; Havelund, K; Kuppe, MA; Mendes, A; Platzer, A; Ringert, JO; Sullivan, A;

Publication
Formal Aspects Comput.

Abstract
We focus on the integration of Formal Methods as mandatory theme in any Computer Science University curriculum. In particular, when considering the ACM Curriculum for Computer Science, the inclusion of Formal Methods as a mandatory Knowledge Area needs arguing for why and how does every computer science graduate benefit from such knowledge. We do not agree with the sentence "While there is a belief that formal methods are important and they are growing in importance, we cannot state that every computer science graduate will need to use formal methods in their career."We argue that formal methods are and have to be an integral part of every computer science curriculum. Just as not all graduates will need to know how to work with databases either, it is still important for students to have a basic understanding of how data is stored and managed efficiently. The same way, students have to understand why and how formal methods work, what their formal background is, and how they are justified. No engineer should be ignorant of the foundations of their subject and the formal methods based on these.In this article, we aim at highlighting why every computer scientist needs to be familiar with formal methods. We argue that education in formal methods plays a key role by shaping students' programming mindset, fostering an appreciation for underlying principles, and encouraging the practice of thoughtful program design and justification, rather than simply writing programs without reflection and deeper understanding. Since integrating formal methods into the computer science curriculum is not a straightforward process, we explore the additional question: what are the tradeoffs between one dedicated knowledge area of formal methods in a computer science curriculum versus having formal methods scattered across all knowledge areas? Solving problems while designing software and software-intensive systems demands an understanding of what is required, followed by a specification and formalizing a solution in a programming language. How to do this systematically and correctly on solid grounds is exactly supported by formal methods. © 2024 Copyright held by the owner/author(s).

2025

Risk Assessment Profiles for Caregiver Burden in Family Caregivers of Persons Living with Alzheimer’s Disease: An Exploratory Study with Machine Learning

Authors
Brito, L; Cepa, B; Brito, C; Leite, Â; Pereira, MG;

Publication
European Journal of Investigation in Health, Psychology and Education

Abstract
Alzheimer’s disease (AD) places a profound global challenge, driven by its escalating prevalence and the multifaceted strain it places on individuals, families, and societies. Family caregivers (FCs), who are pivotal in supporting family members with AD, frequently endure substantial emotional, physical, and psychological demands. To better understand the determinants of family caregiving strain, this study employed machine learning (ML) to develop predictive models identifying factors that contribute to caregiver burden over time. Participants were evaluated across sociodemographic clinical, psychophysiological, and psychological domains at baseline (T1; N = 130), six months (T2; N = 114), and twelve months (T3; N = 92). Results revealed three distinct risk profiles, with the first focusing on T2 data, highlighting the importance of distress, forgiveness, age, and heart rate variability. The second profile integrated T1 and T2 data, emphasizing additional factors like family stress. The third profile combined T1 and T2 data with sociodemographic and clinical features, underscoring the importance of both assessment moments on distress at T2 and forgiveness at T1 and T2, as well as family stress at T1. By employing computational methods, this research uncovers nuanced patterns in caregiver burden that conventional statistical approaches might overlook. Key drivers include psychological factors (distress, forgiveness), physiological markers (heart rate variability), contextual stressors (familial dynamics, sociodemographic disparities). The insights revealed enable early identification of FCs at higher risk of burden, paving the way for personalized interventions. Such strategies are urgently needed as AD rates rise globally, underscoring the imperative to safeguard both patients and the caregivers who support them.

2025

A Tight Security Proof for SPHINCS+, Formally Verified

Authors
Barbosa, M; Dupressoir, F; Hülsing, A; Meijers, M; Strub, P;

Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abstract
SPHINCS+ is a post-quantum signature scheme that, at the time of writing, is being standardized as SLH-DSA. It is the most conservative option for post-quantum signatures, but the original tight proofs of security were flawed — as reported by Kudinov, Kiktenko and Fedorov in 2020. In this work, we formally prove a tight security bound for SPHINCS+ using the EasyCrypt proof assistant, establishing greater confidence in the general security of the scheme and that of the parameter sets considered for standardization. To this end, we reconstruct the tight security proof presented by Hülsing and Kudinov (in 2022) in a modular way. A small but important part of this effort involves a complex argument relating four different games at once, of a form not yet formalized in EasyCrypt (to the best of our knowledge). We describe our approach to overcoming this major challenge, and develop a general formal verification technique aimed at this type of reasoning. Enhancing the set of reusable EasyCrypt  artifacts previously produced in the formal verification of stateful hash-based cryptographic constructions, we (1) improve and extend the existing libraries for hash functions and (2) develop new libraries for fundamental concepts related to hash-based cryptographic constructions, including Merkle trees. These enhancements, along with the formal verification technique we develop, further ease future formal verification endeavors in EasyCrypt, especially those concerning hash-based cryptographic constructions. © International Association for Cryptologic Research 2025.

  • 2
  • 255