Inria Keywords 2019 - Computer Science and Digital Science:



  • A1. Architectures, systems and networks
    • A1.1. Architectures
      • A1.1.1. Multicore, Manycore
      • A1.1.2. Hardware accelerators (GPGPU, FPGA, etc.)
      • A1.1.3. Memory models
      • A1.1.4. High performance computing
      • A1.1.5. Exascale
      • A1.1.8. Security of architectures
      • A1.1.9. Fault tolerant systems
      • A1.1.10. Reconfigurable architectures
      • A1.1.11. Quantum architectures
      • A1.1.12. Non-conventional architectures
      • A1.1.13. Virtualization
    • A1.2. Networks
      • A1.2.1. Dynamic reconfiguration
      • A1.2.2. Supervision
      • A1.2.3. Routing
      • A1.2.4. QoS, performance evaluation
      • A1.2.5. Internet of things
      • A1.2.6. Sensor networks
      • A1.2.7. Cyber-physical systems
      • A1.2.8. Network security
      • A1.2.9. Social Networks
    • A1.3. Distributed Systems
      • A1.3.1. Web
      • A1.3.2. Mobile distributed systems
      • A1.3.3. Blockchain
      • A1.3.4. Peer to peer
      • A1.3.5. Cloud
      • A1.3.6. Fog, Edge
    • A1.4. Ubiquitous Systems
    • A1.5. Complex systems
      • A1.5.1. Systems of systems
      • A1.5.2. Communicating systems
    • A1.6. Green Computing
  • A2. Software
    • A2.1. Programming Languages
      • A2.1.1. Semantics of programming languages
      • A2.1.2. Imperative programming
      • A2.1.3. Object-oriented programming
      • A2.1.4. Functional programming
      • A2.1.5. Constraint programming
      • A2.1.6. Concurrent programming
      • A2.1.7. Distributed programming
      • A2.1.8. Aspect-oriented programming
      • A2.1.9. Synchronous languages
      • A2.1.10. Domain-specific languages
      • A2.1.11. Proof languages
      • A2.1.12. Dynamic languages
    • A2.2. Compilation
      • A2.2.1. Static analysis
      • A2.2.2. Memory models
      • A2.2.3. Memory management
      • A2.2.4. Parallel architectures
      • A2.2.5. Run-time systems
      • A2.2.6. GPGPU, FPGA...
      • A2.2.7. Adaptive compilation
      • A2.2.8. Code generation
      • A2.2.9. Security by compilation
    • A2.3. Embedded and cyber-physical systems
      • A2.3.1. Embedded systems
      • A2.3.2. Cyber-physical systems
      • A2.3.3. Real-time systems
    • A2.4. Formal method for verification, reliability, certification
      • A2.4.1. Analysis
      • A2.4.2. Model-checking
      • A2.4.3. Proofs
    • A2.5. Software engineering
      • A2.5.1. Software Architecture & Design
      • A2.5.2. Component-based Design
      • A2.5.3. Empirical Software Engineering
      • A2.5.4. Software Maintenance & Evolution
      • A2.5.5. Software testing
    • A2.6. Infrastructure software
      • A2.6.1. Operating systems
      • A2.6.2. Middleware
      • A2.6.3. Virtual machines
      • A2.6.4. Ressource management
  • A3. Data and knowledge
    • A3.1. Data
      • A3.1.1. Modeling, representation
      • A3.1.2. Data management, quering and storage
      • A3.1.3. Distributed data
      • A3.1.4. Uncertain data
      • A3.1.5. Control access, privacy
      • A3.1.6. Query optimization
      • A3.1.7. Open data
      • A3.1.8. Big data (production, storage, transfer)
      • A3.1.9. Database
      • A3.1.10. Heterogeneous data
      • A3.1.11. Structured data
    • A3.2. Knowledge
      • A3.2.1. Knowledge bases
      • A3.2.2. Knowledge extraction, cleaning
      • A3.2.3. Inference
      • A3.2.4. Semantic Web
      • A3.2.5. Ontologies
      • A3.2.6. Linked data
    • A3.3. Data and knowledge analysis
      • A3.3.1. On-line analytical processing
      • A3.3.2. Data mining
      • A3.3.3. Big data analysis
    • A3.4. Machine learning and statistics
      • A3.4.1. Supervised learning
      • A3.4.2. Unsupervised learning
      • A3.4.3. Reinforcement learning
      • A3.4.4. Optimization and learning
      • A3.4.5. Bayesian methods
      • A3.4.6. Neural networks
      • A3.4.7. Kernel methods
      • A3.4.8. Deep learning
    • A3.5. Social networks
      • A3.5.1. Analysis of large graphs
      • A3.5.2. Recommendation systems
  • A4. Security and privacy
    • A4.1. Threat analysis
      • A4.1.1. Malware analysis
      • A4.1.2. Hardware attacks
    • A4.2. Correcting codes
    • A4.3. Cryptography
      • A4.3.1. Public key cryptography
      • A4.3.2. Secret key cryptography
      • A4.3.3. Cryptographic protocols
      • A4.3.4. Quantum Cryptography
    • A4.4. Security of equipment and software
    • A4.5. Formal methods for security
    • A4.6. Authentication
    • A4.7. Access control
    • A4.8. Privacy-enhancing technologies
    • A4.9. Security supervision
      • A4.9.1. Intrusion detection
      • A4.9.2. Alert correlation
      • A4.9.3. Reaction to attacks
  • A5. Interaction, multimedia and robotics
    • A5.1. Human-Computer Interaction
      • A5.1.1. Engineering of interactive systems
      • A5.1.2. Evaluation of interactive systems
      • A5.1.3. Haptic interfaces
      • A5.1.4. Brain-computer interfaces, physiological computing
      • A5.1.5. Body-based interfaces
      • A5.1.6. Tangible interfaces
      • A5.1.7. Multimodal interfaces
      • A5.1.8. 3D User Interfaces
      • A5.1.9. User and perceptual studies
    • A5.2. Data visualization
    • A5.3. Image processing and analysis
      • A5.3.1. Compression
      • A5.3.2. Sparse modeling and image representation
      • A5.3.3. Pattern recognition
      • A5.3.4. Registration
      • A5.3.5. Computational photography
    • A5.4. Computer vision
      • A5.4.1. Object recognition
      • A5.4.2. Activity recognition
      • A5.4.3. Content retrieval
      • A5.4.4. 3D and spatio-temporal reconstruction
      • A5.4.5. Object tracking and motion analysis
      • A5.4.6. Object localization
      • A5.4.7. Visual servoing
      • A5.4.8. Motion capture
    • A5.5. Computer graphics
      • A5.5.1. Geometrical modeling
      • A5.5.2. Rendering
      • A5.5.3. Computational photography
      • A5.5.4. Animation
    • A5.6. Virtual reality, augmented reality
      • A5.6.1. Virtual reality
      • A5.6.2. Augmented reality
      • A5.6.3. Avatar simulation and embodiment
      • A5.6.4. Multisensory feedback and interfaces
    • A5.7. Audio modeling and processing
      • A5.7.1. Sound
      • A5.7.2. Music
      • A5.7.3. Speech
      • A5.7.4. Analysis
      • A5.7.5. Synthesis
    • A5.8. Natural language processing
    • A5.9. Signal processing
      • A5.9.1. Sampling, acquisition
      • A5.9.2. Estimation, modeling
      • A5.9.3. Reconstruction, enhancement
      • A5.9.4. Signal processing over graphs
      • A5.9.5. Sparsity-aware processing
      • A5.9.6. Optimization tools
    • A5.10. Robotics
      • A5.10.1. Design
      • A5.10.2. Perception
      • A5.10.3. Planning
      • A5.10.4. Robot control
      • A5.10.5. Robot interaction (with the environment, humans, other robots)
      • A5.10.6. Swarm robotics
      • A5.10.7. Learning
      • A5.10.8. Cognitive robotics and systems
    • A5.11. Smart spaces
      • A5.11.1. Human activity analysis and recognition
      • A5.11.2. Home/building control and interaction
  • A6. Modeling, simulation and control
    • A6.1. Methods in mathematical modeling
      • A6.1.1. Continuous Modeling (PDE, ODE)
      • A6.1.2. Stochastic Modeling
      • A6.1.3. Discrete Modeling (multi-agent, people centered)
      • A6.1.4. Multiscale modeling
      • A6.1.5. Multiphysics modeling
      • A6.1.6. Fractal Modeling
    • A6.2. Scientific computing, Numerical Analysis & Optimization
      • A6.2.1. Numerical analysis of PDE and ODE
      • A6.2.2. Numerical probability
      • A6.2.3. Probabilistic methods
      • A6.2.4. Statistical methods
      • A6.2.5. Numerical Linear Algebra
      • A6.2.6. Optimization
      • A6.2.7. High performance computing
      • A6.2.8. Computational geometry and meshes
    • A6.3. Computation-data interaction
      • A6.3.1. Inverse problems
      • A6.3.2. Data assimilation
      • A6.3.3. Data processing
      • A6.3.4. Model reduction
      • A6.3.5. Uncertainty Quantification
    • A6.4. Automatic control
      • A6.4.1. Deterministic control
      • A6.4.2. Stochastic control
      • A6.4.3. Observability and Controlability
      • A6.4.4. Stability and Stabilization
      • A6.4.5. Control of distributed parameter systems
      • A6.4.6. Optimal control
    • A6.5. Mathematical modeling for physical sciences
      • A6.5.1. Solid mechanics
      • A6.5.2. Fluid mechanics
      • A6.5.3. Transport
      • A6.5.4. Waves
      • A6.5.5. Chemistry
  • A7. Theory of computation
    • A7.1. Algorithms
      • A7.1.1. Distributed algorithms
      • A7.1.2. Parallel algorithms
      • A7.1.3. Graph algorithms
      • A7.1.4. Quantum algorithms
    • A7.2. Logic in Computer Science
      • A7.2.1. Decision procedures
      • A7.2.2. Automated Theorem Proving
      • A7.2.3. Interactive Theorem Proving
      • A7.2.4. Mechanized Formalization of Mathematics
    • A7.3. Calculability and computability
      • A7.3.1. Computational models and calculability
      • A7.3.2. Computability
  • A8. Mathematics of computing
    • A8.1. Discrete mathematics, combinatorics
    • A8.2. Optimization
      • A8.2.1. Operations research
      • A8.2.2. Evolutionary algorithms
      • A8.2.3. Calculus of variations
    • A8.3. Geometry, Topology
    • A8.4. Computer Algebra
    • A8.5. Number theory
    • A8.6. Information theory
    • A8.7. Graph theory
    • A8.8. Network science
    • A8.9. Performance evaluation
    • A8.10. Computer arithmetic
    • A8.11. Game Theory
    • A8.12. Optimal transport
  • A9. Artificial intelligence
    • A9.1. Knowledge
    • A9.2. Machine learning
    • A9.3. Signal analysis
    • A9.4. Natural language processing
    • A9.5. Robotics
    • A9.6. Decision support
    • A9.7. AI algorithmics
    • A9.8. Reasoning
    • A9.9. Distributed AI, Multi-agent
    • A9.10. Hybrid approaches for AI