Exploratory action Ayana AI and Remote Sensing on board for the New Space the AYANA AEx is an interdisciplinary project using knowledge in stochastic modeling, image...
Exploratory action DEPARTURE DistributEd comPuting And network nonlocaliTy in the qUantum inteRnEt Quantum correlations are a cornerstone of quantum information theory, to understand its foundations...
Exploratory action MARCQ Hybrid methods combining Reinforcement Learning and PDE Optimal Control methods for Quantum Computing This project pertains to quantum computing: we are interested in the possibility of encoding a logic...
Exploratory action NO-BIF Structural optimisation of dynamic mechanical systems with bifurcation The design methods for mechanical structures (aeronautics, aerospace, transport, energy production...
Exploratory action OptiGPR3D Optimal direct and inverse modeling for 3D GPR imaging in complex environments With an a priori provided by a classical imaging method, could we design a network of emitters that...
Challenge OS Eliminating the Utilization Gap in Data Centers Data centers are today at the heart of all computing, from providing the computing power that...
Exploratory action PATH PAtient PaThway in the Hospital environment European healthcare systems are faced with multiple challenges, including an aging population, an...
Exploratory action POPEG Wave propagation using Gaussian states Galerkin methods can numerically approximate time-harmonic waves by combining "basis functions"...
Exploratory action ProgReco Program Recognition by Machine Learning and Application to Program Optimization Program comprehension is a fundamental problem in computer science, with many applications (reverse...
Challenge URGE Emergency department patients pathways and care optimization For more than 15 years, emergency departments have been facing a steady increase in their number of...
Challenge ALVEARIUM Large Scale Secure and Reliable Peer-to-Peer Cloud Storage Cloud storage is part of our daily lives. Most user data is stored by large service providers, GAFAM...
Exploratory action Back In Time Baliser l’Analyse CryptographiK de lettres anciennes grâce à l’INtelligence artifi-cielle : Technique et IMplémentation Exploratoire Get ready to uncover unexpected plots and secrets as old as time! BACK IN TIME brings together the...
Exploratory action CACHAÇA Compact Asymmetric Cryptography with High Assurance for Constrained Applications Fast, safe, and strong cryptography is essential for secure networked communications. Currently...
Exploratory action CircleD Computational Structural Reuse for Circular Design Circular design aims at expanding the lifespan of industrial products through repair and reuse. But...