Job opportunities PhD Position F/M Decision models for the Edge-Cloud Computing Continuum Deadline to apply 24/05/2024
Job opportunities PhD Position F/M Enabling Scientific Workflow Composition in Large-Scale Distributed Infrastructures Deadline to apply 04/06/2024
Job opportunities PhD Position F/M Deformable object manipulation by "photometric shape servoing" Deadline to apply 31/05/2024
Project-team ERMINE Measuring and Managing Network operation and economics Networks are omnipresent and increasingly complex, and require an efficient management of their...
Project-team VIRTUS The VIrtual Us The VirtUs team main objective is to create and simulate immersive populated virtual spaces where...
Project-team I4S Statistical Inference for Structural Health Monitoring The overall objective of this project-team is the development of Structural Health Monitoring (SHM)...
Project-team DYLISS Dynamics, Logics and Inference for biological Systems and Sequences Our common "knowledge-based approach" aims at gaining in sensitivity and expressivity through a...
Project-team LACODAM Large scale Collaborative Data Mining The objective of the LACODAM team is to considerably facilitate the process of making sense from...
Project-team WIDE the World Is Distributed Exploring the tension between scale and coordination As distributed computing systems are being deployed within a growing number of everyday applications...
Project-team STACK Software Stack for Massively Geo-Distributed Infrastructures STACK members address challenges related to the management and advanced usages of Utility Computing...
Project-team ODYSSEY Ocean DYnamicS obSErvation analYsis The name Odyssey is a short-cut that stands for ``Ocean DYnamicS obSErvation analYsis'', and aims to...
Project-team EPICURE Semantic analysis and compilation for secure execution environments The frequent announcements of yet another cybersecurity breach show that the security of the...
Project-team CAPSULE Applied Cryptography and Implementation Security CAPSULE’s research activities are organized along four axes, namely symmetric-key cryptography, post...