EN FR
EN FR

Inria keywords 2016 - Computer science and digital science

  • 1. Architectures, systems and networks
    • 1.1. Architectures
      • 1.1.1. Multicore
      • 1.1.2. Hardware accelerators (GPGPU, FPGA, etc.)
      • 1.1.3. Memory models
      • 1.1.4. High performance computing
      • 1.1.5. Exascale
      • 1.1.6. Cloud
      • 1.1.7. Peer to peer
      • 1.1.8. Security of architectures
      • 1.1.9. Fault tolerant systems
      • 1.1.10. Reconfigurable architectures
      • 1.1.11. Quantum architectures
      • 1.1.12. Non-conventional architectures
      • 1.1.13. Virtualization
    • 1.2. Networks
      • 1.2.1. Dynamic reconfiguration
      • 1.2.2. Supervision
      • 1.2.3. Routing
      • 1.2.4. QoS, performance evaluation
      • 1.2.5. Internet of things
      • 1.2.6. Sensor networks
      • 1.2.7. Cyber-physical systems
      • 1.2.8. Network security
      • 1.2.9. Social Networks
    • 1.3. Distributed Systems
    • 1.4. Ubiquitous Systems
    • 1.5. Complex systems
      • 1.5.1. Systems of systems
      • 1.5.2. Communicating systems
    • 1.6. Green Computing
  • 2. Software
    • 2.1. Programming Languages
      • 2.1.1. Semantics of programming languages
      • 2.1.2. Object-oriented programming
      • 2.1.3. Functional programming
      • 2.1.4. Aspect-oriented programming
      • 2.1.5. Constraint programming
      • 2.1.6. Concurrent programming
      • 2.1.7. Distributed programming
      • 2.1.8. Synchronous languages
      • 2.1.9. Dynamic languages
      • 2.1.10. Domain-specific languages
      • 2.1.11. Proof languages
    • 2.2. Compilation
      • 2.2.1. Static analysis
      • 2.2.2. Memory models
      • 2.2.3. Run-time systems
      • 2.2.4. Parallel architectures
      • 2.2.5. GPGPU, FPGA, etc.
      • 2.2.6. Adaptive compilation
    • 2.3. Embedded and cyber-physical systems
      • 2.3.1. Embedded systems
      • 2.3.2. Cyber-physical systems
      • 2.3.3. Real-time systems
    • 2.4. Verification, reliability, certification
      • 2.4.1. Analysis
      • 2.4.2. Model-checking
      • 2.4.3. Proofs
    • 2.5. Software engineering
      • 2.5.1. Software Architecture & Design
      • 2.5.2. Component-based Design
      • 2.5.3. Empirical Software Engineering
      • 2.5.4. Software Maintenance & Evolution
    • 2.6. Infrastructure software
      • 2.6.1. Operating systems
      • 2.6.2. Middleware
      • 2.6.3. Virtual machines
  • 3. Data and knowledge
    • 3.1. Data
      • 3.1.1. Modeling, representation
      • 3.1.2. Data management, quering and storage
      • 3.1.3. Distributed data
      • 3.1.4. Uncertain data
      • 3.1.5. Control access, privacy
      • 3.1.6. Query optimization
      • 3.1.7. Open data
      • 3.1.8. Big data (production, storage, transfer)
      • 3.1.9. Database
    • 3.2. Knowledge
      • 3.2.1. Knowledge bases
      • 3.2.2. Knowledge extraction, cleaning
      • 3.2.3. Inference
      • 3.2.4. Semantic Web
      • 3.2.5. Ontologies
    • 3.3. Data and knowledge analysis
      • 3.3.1. On-line analytical processing
      • 3.3.2. Data mining
      • 3.3.3. Big data analysis
    • 3.4. Machine learning and statistics
      • 3.4.1. Supervised learning
      • 3.4.2. Unsupervised learning
      • 3.4.3. Reinforcement learning
      • 3.4.4. Optimization and learning
      • 3.4.5. Bayesian methods
      • 3.4.6. Neural networks
      • 3.4.7. Kernel methods
      • 3.4.8. Deep learning
    • 3.5. Social networks
      • 3.5.1. Analysis of large graphs
      • 3.5.2. Recommendation systems
  • 4. Security and privacy
    • 4.1. Threat analysis
      • 4.1.1. Malware analysis
      • 4.1.2. Hardware attacks
    • 4.2. Correcting codes
    • 4.3. Cryptography
      • 4.3.1. Public key cryptography
      • 4.3.2. Secret key cryptography
      • 4.3.3. Cryptographic protocols
    • 4.4. Security of equipment and software
    • 4.5. Formal methods for security
    • 4.6. Authentication
    • 4.7. Access control
    • 4.8. Privacy-enhancing technologies
    • 4.9. Security supervision
      • 4.9.1. Intrusion detection
      • 4.9.2. Alert correlation
      • 4.9.3. Reaction to attacks
  • 5. Interaction, multimedia and robotics
    • 5.1. Human-Computer Interaction
      • 5.1.1. Engineering of interactive systems
      • 5.1.2. Evaluation of interactive systems
      • 5.1.3. Haptic interfaces
      • 5.1.4. Brain-computer interfaces, physiological computing
      • 5.1.5. Body-based interfaces
      • 5.1.6. Tangible interfaces
      • 5.1.7. Multimodal interfaces
      • 5.1.8. 3D User Interfaces
    • 5.2. Data visualization
    • 5.3. Image processing and analysis
      • 5.3.1. Compression
      • 5.3.2. Sparse modeling and image representation
      • 5.3.3. Pattern recognition
      • 5.3.4. Registration
      • 5.3.5. Computational photography
    • 5.4. Computer vision
      • 5.4.1. Object recognition
      • 5.4.2. Activity recognition
      • 5.4.3. Content retrieval
      • 5.4.4. 3D and spatio-temporal reconstruction
      • 5.4.5. Object tracking and motion analysis
      • 5.4.6. Object localization
      • 5.4.7. Visual servoing
    • 5.5. Computer graphics
      • 5.5.1. Geometrical modeling
      • 5.5.2. Rendering
      • 5.5.3. Computational photography
      • 5.5.4. Animation
    • 5.6. Virtual reality, augmented reality
    • 5.7. Audio modeling and processing
      • 5.7.1. Sound
      • 5.7.2. Music
      • 5.7.3. Speech
      • 5.7.4. Analysis
      • 5.7.5. Synthesis
    • 5.8. Natural language processing
    • 5.9. Signal processing
      • 5.9.1. Sampling, acquisition
      • 5.9.2. Estimation, modeling
      • 5.9.3. Reconstruction, enhancement
      • 5.9.4. Signal processing over graphs
      • 5.9.5. Sparsity-aware processing
      • 5.9.6. Optimization tools
    • 5.10. Robotics
      • 5.10.1. Design
      • 5.10.2. Perception
      • 5.10.3. Planning
      • 5.10.4. Robot control
      • 5.10.5. Robot interaction (with the environment, humans, other robots)
      • 5.10.6. Swarm robotics
      • 5.10.7. Learning
      • 5.10.8. Cognitive robotics and systems
    • 5.11. Smart spaces
      • 5.11.1. Human activity analysis and recognition
      • 5.11.2. Home/building control and interaction
  • 6. Modeling, simulation and control
    • 6.1. Mathematical Modeling
      • 6.1.1. Continuous Modeling (PDE, ODE)
      • 6.1.2. Stochastic Modeling (SPDE, SDE)
      • 6.1.3. Discrete Modeling (multi-agent, people centered)
      • 6.1.4. Multiscale modeling
      • 6.1.5. Multiphysics modeling
      • 6.1.6. Fractal Modeling
    • 6.2. Scientific Computing, Numerical Analysis & Optimization
      • 6.2.1. Numerical analysis of PDE and ODE
      • 6.2.2. Numerical probability
      • 6.2.3. Probabilistic methods
      • 6.2.4. Statistical methods
      • 6.2.5. Numerical Linear Algebra
      • 6.2.6. Optimization
      • 6.2.7. High performance computing
      • 6.2.8. Computational geometry and meshes
    • 6.3. Computation-data interaction
      • 6.3.1. Inverse problems
      • 6.3.2. Data assimilation
      • 6.3.3. Data processing
      • 6.3.4. Model reduction
      • 6.3.5. Uncertainty Quantification
    • 6.4. Automatic control
      • 6.4.1. Deterministic control
      • 6.4.2. Stochastic control
      • 6.4.3. Observability and Controlability
      • 6.4.4. Stability and Stabilization
  • 7. Fundamental Algorithmics
    • 7.1. Parallel and distributed algorithms
    • 7.2. Discrete mathematics, combinatorics
    • 7.3. Optimization
    • 7.4. Logic in Computer Science
    • 7.5. Geometry, Topology
    • 7.6. Computer Algebra
    • 7.7. Number theory
    • 7.8. Information theory
    • 7.9. Graph theory
    • 7.10. Network science
    • 7.11. Performance evaluation
    • 7.12. Computer arithmetic
    • 7.13. Quantum algorithms
    • 7.14. Game Theory
  • 8. Artificial intelligence
    • 8.1. Knowledge
    • 8.2. Machine learning
    • 8.3. Signal analysis
    • 8.4. Natural language processing
    • 8.5. Robotics
    • 8.6. Decision support
    • 8.7. AI algorithmics