A1. Architectures, systems and networks
A1.1. Architectures
A1.1.1. Multicore, Manycore
A1.1.2. Hardware accelerators (GPGPU, FPGA, etc.)
A1.1.3. Memory models
A1.1.4. High performance computing
A1.1.5. Exascale
A1.1.8. Security of architectures
A1.1.9. Fault tolerant systems
A1.1.10. Reconfigurable architectures
A1.1.11. Quantum architectures
A1.1.12. Non-conventional architectures
A1.1.13. Virtualization
A1.2. Networks
A1.2.1. Dynamic reconfiguration
A1.2.2. Supervision
A1.2.3. Routing
A1.2.4. QoS, performance evaluation
A1.2.5. Internet of things
A1.2.6. Sensor networks
A1.2.7. Cyber-physical systems
A1.2.8. Network security
A1.2.9. Social Networks
A1.3. Distributed Systems
A1.3.1. Web
A1.3.2. Mobile distributed systems
A1.3.3. Blockchain
A1.3.4. Peer to peer
A1.3.5. Cloud
A1.3.6. Fog, Edge
A1.4. Ubiquitous Systems
A1.5. Complex systems
A1.5.1. Systems of systems
A1.5.2. Communicating systems
A1.6. Green Computing
A2. Software
A2.1. Programming Languages
A2.1.1. Semantics of programming languages
A2.1.2. Imperative programming
A2.1.3. Object-oriented programming
A2.1.4. Functional programming
A2.1.5. Constraint programming
A2.1.6. Concurrent programming
A2.1.7. Distributed programming
A2.1.8. Aspect-oriented programming
A2.1.9. Synchronous languages
A2.1.10. Domain-specific languages
A2.1.11. Proof languages
A2.1.12. Dynamic languages
A2.2. Compilation
A2.2.1. Static analysis
A2.2.2. Memory models
A2.2.3. Memory management
A2.2.4. Parallel architectures
A2.2.5. Run-time systems
A2.2.6. GPGPU, FPGA...
A2.2.7. Adaptive compilation
A2.2.8. Code generation
A2.2.9. Security by compilation
A2.3. Embedded and cyber-physical systems
A2.3.1. Embedded systems
A2.3.2. Cyber-physical systems
A2.3.3. Real-time systems
A2.4. Formal method for verification, reliability, certification
A2.4.1. Analysis
A2.4.2. Model-checking
A2.4.3. Proofs
A2.5. Software engineering
A2.5.1. Software Architecture & Design
A2.5.2. Component-based Design
A2.5.3. Empirical Software Engineering
A2.5.4. Software Maintenance & Evolution
A2.5.5. Software testing
A2.6. Infrastructure software
A2.6.1. Operating systems
A2.6.2. Middleware
A2.6.3. Virtual machines
A2.6.4. Ressource management
A3. Data and knowledge
A3.1. Data
A3.1.1. Modeling, representation
A3.1.2. Data management, quering and storage
A3.1.3. Distributed data
A3.1.4. Uncertain data
A3.1.5. Control access, privacy
A3.1.6. Query optimization
A3.1.7. Open data
A3.1.8. Big data (production, storage, transfer)
A3.1.9. Database
A3.1.10. Heterogeneous data
A3.1.11. Structured data
A3.2. Knowledge
A3.2.1. Knowledge bases
A3.2.2. Knowledge extraction, cleaning
A3.2.3. Inference
A3.2.4. Semantic Web
A3.2.5. Ontologies
A3.2.6. Linked data
A3.3. Data and knowledge analysis
A3.3.1. On-line analytical processing
A3.3.2. Data mining
A3.3.3. Big data analysis
A3.4. Machine learning and statistics
A3.4.1. Supervised learning
A3.4.2. Unsupervised learning
A3.4.3. Reinforcement learning
A3.4.4. Optimization and learning
A3.4.5. Bayesian methods
A3.4.6. Neural networks
A3.4.7. Kernel methods
A3.4.8. Deep learning
A3.5. Social networks
A3.5.1. Analysis of large graphs
A3.5.2. Recommendation systems
A4. Security and privacy
A4.1. Threat analysis
A4.1.1. Malware analysis
A4.1.2. Hardware attacks
A4.2. Correcting codes
A4.3. Cryptography
A4.3.1. Public key cryptography
A4.3.2. Secret key cryptography
A4.3.3. Cryptographic protocols
A4.3.4. Quantum Cryptography
A4.4. Security of equipment and software
A4.5. Formal methods for security
A4.6. Authentication
A4.7. Access control
A4.8. Privacy-enhancing technologies
A4.9. Security supervision
A4.9.1. Intrusion detection
A4.9.2. Alert correlation
A4.9.3. Reaction to attacks
A5. Interaction, multimedia and robotics
A5.1. Human-Computer Interaction
A5.1.1. Engineering of interactive systems
A5.1.2. Evaluation of interactive systems
A5.1.3. Haptic interfaces
A5.1.4. Brain-computer interfaces, physiological computing
A5.1.5. Body-based interfaces
A5.1.6. Tangible interfaces
A5.1.7. Multimodal interfaces
A5.1.8. 3D User Interfaces
A5.1.9. User and perceptual studies
A5.2. Data visualization
A5.3. Image processing and analysis
A5.3.1. Compression
A5.3.2. Sparse modeling and image representation
A5.3.3. Pattern recognition
A5.3.4. Registration
A5.3.5. Computational photography
A5.4. Computer vision
A5.4.1. Object recognition
A5.4.2. Activity recognition
A5.4.3. Content retrieval
A5.4.4. 3D and spatio-temporal reconstruction
A5.4.5. Object tracking and motion analysis
A5.4.6. Object localization
A5.4.7. Visual servoing
A5.4.8. Motion capture
A5.5. Computer graphics
A5.5.1. Geometrical modeling
A5.5.2. Rendering
A5.5.3. Computational photography
A5.5.4. Animation
A5.6. Virtual reality, augmented reality
A5.6.1. Virtual reality
A5.6.2. Augmented reality
A5.6.3. Avatar simulation and embodiment
A5.6.4. Multisensory feedback and interfaces
A5.7. Audio modeling and processing
A5.7.1. Sound
A5.7.2. Music
A5.7.3. Speech
A5.7.4. Analysis
A5.7.5. Synthesis
A5.8. Natural language processing
A5.9. Signal processing
A5.9.1. Sampling, acquisition
A5.9.2. Estimation, modeling
A5.9.3. Reconstruction, enhancement
A5.9.4. Signal processing over graphs
A5.9.5. Sparsity-aware processing
A5.9.6. Optimization tools
A5.10. Robotics
A5.10.1. Design
A5.10.2. Perception
A5.10.3. Planning
A5.10.4. Robot control
A5.10.5. Robot interaction (with the environment, humans, other robots)
A5.10.6. Swarm robotics
A5.10.7. Learning
A5.10.8. Cognitive robotics and systems
A5.11. Smart spaces
A5.11.1. Human activity analysis and recognition
A5.11.2. Home/building control and interaction
A6. Modeling, simulation and control
A6.1. Methods in mathematical modeling
A6.1.1. Continuous Modeling (PDE, ODE)
A6.1.2. Stochastic Modeling
A6.1.3. Discrete Modeling (multi-agent, people centered)
A6.1.4. Multiscale modeling
A6.1.5. Multiphysics modeling
A6.1.6. Fractal Modeling
A6.2. Scientific computing, Numerical Analysis & Optimization
A6.2.1. Numerical analysis of PDE and ODE
A6.2.2. Numerical probability
A6.2.3. Probabilistic methods
A6.2.4. Statistical methods
A6.2.5. Numerical Linear Algebra
A6.2.6. Optimization
A6.2.7. High performance computing
A6.2.8. Computational geometry and meshes
A6.3. Computation-data interaction
A6.3.1. Inverse problems
A6.3.2. Data assimilation
A6.3.3. Data processing
A6.3.4. Model reduction
A6.3.5. Uncertainty Quantification
A6.4. Automatic control
A6.4.1. Deterministic control
A6.4.2. Stochastic control
A6.4.3. Observability and Controlability
A6.4.4. Stability and Stabilization
A6.4.5. Control of distributed parameter systems
A6.4.6. Optimal control
A6.5. Mathematical modeling for physical sciences
A6.5.1. Solid mechanics
A6.5.2. Fluid mechanics
A6.5.3. Transport
A6.5.4. Waves
A6.5.5. Chemistry
A7. Theory of computation
A7.1. Algorithms
A7.1.1. Distributed algorithms
A7.1.2. Parallel algorithms
A7.1.3. Graph algorithms
A7.1.4. Quantum algorithms
A7.2. Logic in Computer Science
A7.2.1. Decision procedures
A7.2.2. Automated Theorem Proving
A7.2.3. Interactive Theorem Proving
A7.2.4. Mechanized Formalization of Mathematics
A7.3. Calculability and computability
A7.3.1. Computational models and calculability
A7.3.2. Computability
A8. Mathematics of computing
A8.1. Discrete mathematics, combinatorics
A8.2. Optimization
A8.2.1. Operations research
A8.2.2. Evolutionary algorithms
A8.2.3. Calculus of variations
A8.3. Geometry, Topology
A8.4. Computer Algebra
A8.5. Number theory
A8.6. Information theory
A8.7. Graph theory
A8.8. Network science
A8.9. Performance evaluation
A8.10. Computer arithmetic
A8.11. Game Theory
A8.12. Optimal transport
A9. Artificial intelligence
A9.1. Knowledge
A9.2. Machine learning
A9.3. Signal analysis
A9.4. Natural language processing
A9.5. Robotics
A9.6. Decision support
A9.7. AI algorithmics
A9.8. Reasoning
A9.9. Distributed AI, Multi-agent
A9.10. Hybrid approaches for AI