Areas of Activity#

Here you will find all fields of scholarship for this section.This page is created automatically.

3

5
  • 5G networks and services Go to
A
  • Abstract interpretation Go to
  • Abstract Interpretation Go to
  • Abstract interpretation Go to
  • Abstraction, refinement, and counterexamples Go to
  • Abstract Machines Go to
  • Access control in information security Go to
  • Adiabatic quantum computation Go to
  • Advanced program development technology Go to
  • Affective Computing Go to
  • Agent-based computing Go to
  • Agents, agent oriented software engineering Go to
  • AI and Internet of Things Go to
  • AI Go to
  • Algebraic and categorical models of concurrency Go to
  • Algebraic coding theory Go to
  • Algebraic development methodologies Go to
  • Algebraic specification of data and programs Go to
  • Algebraic specifications Go to
  • Algebraic theory of automata and languages Go to
  • Algorithm design and analysis Go to
  • Algorithm engineering Go to
  • Algorithm engineering Go to
  • Algorithmic bioinformatics Go to
  • Algorithmic game theory Go to
  • Algorithmic game theory Go to
  • ALGORITHMIC GRAPH THEORY, DISCRETE MATHEMATICS, ARTIFICIAL INTELLIGENCE Go to
  • Algorithmic graph theory Go to
  • Algorithmic information theory Go to
  • Algorithmic information theory Go to
  • Algorithmic mathematics Go to
  • Algorithmics Go to
  • Algorithmic verification Go to
  • ALGORITHMS AND COMPLEXITY Go to
  • Algorithms and complexity Go to
  • Algorithms and complexity: Probabilistic methods in algorithms, combinatorial optimization, average case analysis of algorithms, parallel algorithms, algorithms and protocols for distributed systems, algorithms and complexity of graph theoretic problems, parallel complexity, approximations to hard problems Go to
  • Algorithms and complexity theory Go to
  • Algorithms and data structures Go to
  • Algorithms and data structures Go to
  • Algorithms and software tools for analyzing genome rearrangements Go to
  • Algorithms and software tools for computational proteomics Go to
  • Algorithms and software tools for de novo antibiotics sequencing Go to
  • Algorithms and software tools for de novo antibody sequencing Go to
  • Algorithms and software tools for genome assembly Go to
  • Algorithms and tools for the design and verification of reactive and distributed systems Go to
  • ALGORITHMS, COMPLEXITY, MATHEMATICAL SCIENCES POPULARIZATION Go to
  • Algorithms for approximately counting and randomly sampling combinatorial structures Go to
  • Algorithms for Electronic Design Automation Go to
  • Algorithms for graph drawing Go to
  • Algorithms for network analysis Go to
  • Algorithms for NP-hard problems Go to
  • Algorithms for route planning Go to
  • Algorithms for uncovering molecular mechanisms of disease from systems-level “omics” data Go to
  • Algorithms Go to
  • Algorithms Go to
  • Algorithms Go to
  • ALGORITHMS Go to
  • Algorithms Go to
  • Alternative splicing Go to
  • Analysis and synthesis of asynchronous circuits Go to
  • Analysis of algorithms Go to
  • Analysis of audio- and video signals Go to
  • Analysis of geometric structures Go to
  • Analysis of historical manuscripts Go to
  • Analysis of Markov-chain based sampling algorithms Go to
  • Analysis of non-stationary signals Go to
  • Analysis of probabilistic systems Go to
  • Analysis of protein-protein interaction networks Go to
  • Application of rigorous methods to software production Go to
  • Applications of discrete mathematics in science (mathematical chemistry and bioinformatics) Go to
  • Applications of equational logic in computer science Go to
  • Applications of linear and constraint programming to verification problems Go to
  • Applications of logic in algebra and other fields of mathematics Go to
  • Applications of logic in computer science Go to
  • Applications of logic to philosophy, linguistics, computer science and cognitive science (generalized quantifiers, categorial grammar, process logics, information update, logic and games, logic & epistemology) Go to
  • Applications of ML and DM in Environmental Sciences Go to
  • Applications of ML and DM in Life Sciences Go to
  • Applications of model checking to ubiquitous computing Go to
  • Applications optimization Go to
  • Application to databases Go to
  • Applied cryptography Go to
  • Applied mathematics and statistics Go to
  • Applied mathematics Go to
  • Applied statistics and mathematics Go to
  • Approximation algorithms Go to
  • Approximation algorithms Go to
  • Approximation algorithms Go to
  • Approximation of NP-hard optimization problems Go to
  • Architecture/compiler co-design Go to
  • Artificial and Computational Intelligence, notably multivalued and fuzzy logic Go to
  • Artificial intelligence, artificial life Go to
  • ARTIFICIAL INTELLIGENCE Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial Intelligence Go to
  • Artificial Intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial intelligence Go to
  • Artificial Intelligence Go to
  • Artificial Intelligence, in particular the symbolic representation of knowledge and its use for inference Go to
  • ARTIFICIAL INTELLIGENCE, INTELLIGENT SYSTEMS Go to
  • Artificial intelligence (logical theory of robot problem solving) Go to
  • Artificial intelligence methods to model human behavior from data Go to
  • Aspects of number theory Go to
  • Assistive technologies Go to
  • Asynchronous circuits Go to
  • Asynchronous digital systems Go to
  • Auction algorithms Go to
  • Audio processing and voice conversion Go to
  • Augmented reality Go to
  • Authentication and secret sharing Go to
  • Authentication - security evaluation and design Go to
  • Automata and formal languages Go to
  • Automata and language theory (descriptional complexity, regulated rewriting, Marcus contextual grammars, grammar systems) Go to
  • Automata models for concurrency Go to
  • Automata on infinite objects Go to
  • Automata over infinite words and trees Go to
  • Automata theory Go to
  • AUTOMATA THEORY Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automata Theory Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automata theory Go to
  • Automated deduction Go to
  • Automated deduction Go to
  • Automated planning Go to
  • Automated reasoning Go to
  • Automated reasoning Go to
  • Automated reasoning Go to
  • Automated verification and proof checking Go to
  • Automated verification Go to
  • Automated verification of hardware and software systems Go to
  • Automatic documentation tools Go to
  • Automatic hypertext/Web-site generation Go to
  • Automatic synthesis of connectors for heterogeneous systems. Go to
  • Automatic verification Go to
  • Automatic verification of finite-state systems Go to
  • Autonomic computing Go to
  • Autonomic computing Go to
  • Autonomous mobile robotics Go to
  • Autonomous systems Go to
  • Autonomous Systems Go to
  • Average-case analysis of several online problems Go to
  • Axiomatic semantics Go to
  • Axiomatic set theory Go to
B
  • Bayesian networks Go to
  • Big data analysis Go to
  • Big data analysis Go to
  • Big Data analytics Go to
  • Big Data for Social Good Go to
  • Big data Go to
  • Big data Go to
  • Big data management Go to
  • Bioinformatics and biosensors Go to
  • Bioinformatics and computational biology Go to
  • Bioinformatics applications Go to
  • Bioinformatics & Data Analysis Go to
  • Bioinformatics Go to
  • Bioinformatics Go to
  • Bioinformatics Go to
  • Bioinformatics Go to
  • Bio-inspired computing Go to
  • Bio-inspired optimization methods Go to
  • Biological data management Go to
  • Biological sequence analysis Go to
  • Biomedical signal and image processing Go to
  • Biomedical signal processing Go to
  • B Method for software engineering Go to
  • Boolean functions Go to
  • Boolean Satisfiability Go to
  • Bridging membrane computing and process calculi Go to
  • Business process management Go to
  • Business process management Go to
C
  • Calendar algorithms Go to
  • Category theory Go to
  • Category theory Go to
  • Certified software Go to
  • Church-Turing thesis Go to
  • Circuit Complexity Go to
  • Circuit complexity Go to
  • Circuits and VLSI Go to
  • Circuit specification and synthesis Go to
  • Civil engineering Go to
  • Cloud computing Go to
  • Cloud computing Go to
  • Cloud computing Go to
  • CLOUD COMPUTING Go to
  • Cloud computing Go to
  • Cluster analysis Go to
  • Clustering and Data Mining Go to
  • Cognition and Foundations of mathematical knowledge Go to
  • Cognitive computer vision Go to
  • Cognitive computing Go to
  • Cognitive science (consciousness, phenomenology, human experience) Go to
  • Cognitive user modeling and conceptualization Go to
  • Coherent logic Go to
  • Collective intelligence and urban computing Go to
  • Combination of specification methods for processes, time and data Go to
  • Combinatorial algorithms and their application Go to
  • Combinatorial algorithms Go to
  • Combinatorial and Global Optimization Go to
  • Combinatorial group theory Go to
  • Combinatorial models for optimization Go to
  • Combinatorial optimization and its applications Go to
  • Combinatorial optimization Go to
  • Combinatorial optimization Go to
  • Combinatorial optimization Go to
  • Combinatorial optimization Go to
  • Combinatorial optimization Go to
  • Combinatorial theory Go to
  • Combinatorics and special functions Go to
  • Combinatorics Go to
  • Combinatorics of words Go to
  • Combinatorics on Words Go to
  • Combinatorics on words Go to
  • Combinatorics on words Go to
  • Combinatorics with graph theory Go to
  • Communicating systems Go to
  • Communication complexity Go to
  • Communication protocols Go to
  • Communication software Go to
  • Comparative genomics Go to
  • Compilers for programming languages Go to
  • Compiler theory Go to
  • Complex information search and analysis Go to
  • Complexity of algorithms Go to
  • Complexity of counting Go to
  • Complexity of data structures and algorithms Go to
  • Complexity theory and phase transition of problems Go to
  • Complexity theory Go to
  • Complexity theory Go to
  • Complexity theory Go to
  • Complex system Go to
  • Component-based design, modeling, and analysis of real-time systems with focus on correct-by-construction techniques Go to
  • Component based Software Engineering (CBSE) Go to
  • Compositional model checking Go to
  • Computability Go to
  • Computability (levels of undecidability) Go to
  • Computability theories, especially for continuous/analogue data Go to
  • Computability theory Go to
  • Computational biology Go to
  • COMPUTATIONAL COMPLEXITY Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity Go to
  • Computational complexity of verification problems Go to
  • Computational complexity theory Go to
  • Computational complexity theory Go to
  • Computational complexity theory Go to
  • Computational-complexity theory Go to
  • Computational foundations of physics Go to
  • Computational geometry and applications Go to
  • Computational geometry and object modeling Go to
  • COMPUTATIONAL GEOMETRY Go to
  • Computational geometry Go to
  • Computational geometry Go to
  • Computational geometry Go to
  • Computational geometry Go to
  • Computational graph theory, algorithms, models Go to
  • Computational intelligence Go to
  • Computational Intelligence Go to
  • COMPUTATIONAL INTELLIGENCE Go to
  • Computational intelligence Go to
  • COMPUTATIONAL INTELLIGENCE, SYSTEMS AND CYBERNETICS Go to
  • COMPUTATIONAL LOGIC Go to
  • Computational logic Go to
  • Computational Logic Go to
  • Computational logic Go to
  • Computational logic Go to
  • Computational machine learning Go to
  • Computational modelling for systems biology and population biology Go to
  • Computational models of group decision making, social choice and voting, and consensus reaching Go to
  • Computational molecular biology Go to
  • Computational neuroscience Go to
  • COMPUTATIONAL NEUROSCIENCE Go to
  • Computational neuroscience Go to
  • Computational Scientific Discovery Go to
  • Computational Social Sciences Go to
  • Computational topology Go to
  • Computation complexity Go to
  • Computation Go to
  • COMPUTER-AIDED DESIGN Go to
  • Computer-aided design Go to
  • Computer-aided design, test and verification of (digital) circuits and systems (VLSI CAD) Go to
  • Computer-aided geometric design Go to
  • Computer aided (geometric) design Go to
  • Computer-aided verification Go to
  • Computer algebra Go to
  • Computer algebra Go to
  • Computer algebra: polynomial algorithms,theory of Groebner Bases, automated geometrical theorem proving Go to
  • Computer and network security Go to
  • Computer animation Go to
  • Computer architecture Go to
  • Computer architecture Go to
  • COMPUTER ARCHITECTURE Go to
  • Computer architecture Go to
  • Computer architecture Go to
  • Computer architecture Go to
  • Computer arithmetic Go to
  • COMPUTER COMMUNICATION Go to
  • Computer communication networks Go to
  • COMPUTER ENGINEERING Go to
  • Computer engineering Go to
  • Computer engineering Go to
  • COMPUTER ENGINEERING, INFORMATION SYSTEMS Go to
  • COMPUTER GRAPHICS Go to
  • Computer graphics Go to
  • Computer graphics Go to
  • Computer graphics Go to
  • Computer graphics Go to
  • Computer graphics Go to
  • Computer graphics Go to
  • Computer memory systems Go to
  • Computer network design and performance Go to
  • COMPUTER NETWORKING Go to
  • COMPUTER NETWORKS Go to
  • Computer networks Go to
  • Computer privacy Go to
  • Computer reliability and security Go to
  • COMPUTER SCIENCE & ALGEBRA Go to
  • Computer Science and Artificial Intelligence Go to
  • Computer science education Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • Computer science Go to
  • COMPUTER SCIENCE, NEUROSCIENCE, NEUROLOGY, STRUCTURAL ENGINEERING, CIVIL ENGINEERING Go to
  • Computer security Go to
  • Computer Security Go to
  • Computer security, in particular access control and security policies Go to
  • Computer simulation Go to
  • Computer simulation Go to
  • COMPUTER SOFTWARE AND THEORY Go to
  • COMPUTER SOFTWARE Go to
  • Computer-supported collaborative learning Go to
  • Computer supported cooperative work Go to
  • Computer system performance evaluation Go to
  • Computer systems and networks: Design and applications of network protocols, security in computer networks, telematics problems and services Go to
  • COMPUTER SYSTEMS Go to
  • Computer systems measurement and modeling Go to
  • Computer Vision Go to
  • Computer vision Go to
  • Computer vision Go to
  • Computer vision Go to
  • COMPUTING Go to
  • COMPUTING & MATHEMATICS Go to
  • COMPUTING, MATHEMATICS Go to
  • Concurrency Go to
  • Concurrency Go to
  • CONCURRENCY THEORY Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrency theory Go to
  • Concurrent algorithms Go to
  • Concurrent and parallel programming Go to
  • Concurrent computation Go to
  • Concurrent object Go to
  • Concurrent programming languages Go to
  • Conformance checking Go to
  • Connections with semigroup theory Go to
  • Constraint-Based Data Mining Go to
  • Constraint/logic/functional programming theory and implementation Go to
  • Constraint programming Go to
  • Constraint programming Go to
  • Constraint Satisfaction Go to
  • Constraint satisfaction Go to
  • Constraint scheduling Go to
  • Constraint theory and applications Go to
  • Constructive mathematics Go to
  • Coordination languages and models Go to
  • Coordination models Go to
  • Counting and approximation the solution of problems Go to
  • Crowd-sourcing Go to
  • Cryptanalysis and design of cryptographic algorithms and protocols Go to
  • Cryptograhpy Go to
  • Cryptography Go to
  • Cryptography Go to
  • CRYPTOGRAPHY Go to
  • Cryptography Go to
  • CRYPTOLOGY AND INFORMATION SECURITY Go to
  • Cryptology (cryptography and cryptanalysis) Go to
  • Cryptology Go to
  • CRYPTOLOGY INFORMATION SECURITY Go to
  • Cultural heritage Go to
  • Cybersecurity Go to
D
  • Data analysis Go to
  • Data analysis Go to
  • Data analysis Go to
  • Data Analytics and Science Go to
  • Data analytics, knowledge discovery and data mining Go to
  • Data analytics, modeling, fusion, dynamics, applied to clinical, molecular and biological data Go to
  • DATA AND INFORMATION MANAGEMENT Go to
  • Data and signal analysis Go to
  • Data anonymisation Go to
  • Database management Go to
  • Database management Go to
  • Database performance optimization (automatic tuning) and self-organization (autonomic computing) Go to
  • Database programming languages Go to
  • Database query optimization Go to
  • DATABASES AND INFORMATION SYSTEMS Go to
  • Databases Go to
  • Databases Go to
  • Databases Go to
  • DATABASES, INFORMATION MANAGEMENT Go to
  • Database systems and theory Go to
  • Database systems Go to
  • Database systems Go to
  • Database technology for openData platforms - integration and consumption Go to
  • Database theory Go to
  • Database theory Go to
  • Database theory Go to
  • Database theory Go to
  • Database theory Go to
  • DATABASE THEORY Go to
  • Database theory (query languages and their power) Go to
  • Data-centered business processes Go to
  • Data communications Go to
  • Data integration Go to
  • Data integration Go to
  • DATA MANAGEMENT Go to
  • Data management Go to
  • Data mining and knowledge discovery, notably for decision support systems Go to
  • Data mining Go to
  • Data mining Go to
  • Data mining Go to
  • Data mining Go to
  • Data mining Go to
  • Data Mining Go to
  • Data modeling Go to
  • Data network Go to
  • DATA NETWORKS Go to
  • Data privacy Go to
  • Data processing in joint time and frequency domain Go to
  • Data provenance Go to
  • Data quality Go to
  • DATA SCIENCE Go to
  • Data science Go to
  • Data science Go to
  • Data security Go to
  • Data structures Go to
  • Data structures Go to
  • Data structures Go to
  • Data structures Go to
  • Data warehousing Go to
  • DB & IR integration (database systems & information retrieval) Go to
  • Decidability and undecidability questions Go to
  • Decidability problems Go to
  • Decidable theories Go to
  • Decision Sciences Go to
  • Decision support in medicine, technology, economics and environmental studie Go to
  • Decision theory Go to
  • DECISION THEORY, OPERATIONS RESEARCH, MATHEMATICS OF CONFLICT, SOCIAL CHOICE THEORY Go to
  • Decoding of linear binary block codes Go to
  • Decomposition of correctness proofs for hybrid systems in traffic applications Go to
  • Deep learning Go to
  • DEPENDABILITY Go to
  • dependability Go to
  • Dependable, reliable, and secure computing Go to
  • Descriptional complexity of grammars and languages Go to
  • Description logic Go to
  • Description logics Go to
  • Description logics Go to
  • Design and analysis of algorithms Go to
  • Design and analysis of algorithms Go to
  • Design and analysis of computer algorithms Go to
  • Design and evaluation of interactive multimodal user interfaces Go to
  • Design and Verification of safety-critical embedded systems Go to
  • Design of efficient algorithms Go to
  • Design of system-on-chip platforms for embedded applications Go to
  • Design space exploration and multi-objective optimization Go to
  • Design specification and verification Go to
  • Development and analysis of efficient data structures and algorithms in VLSI CAD Go to
  • Development methods for complex industrial-scale software systems Go to
  • Development methods for real-time systems Go to
  • Development of algorithms Go to
  • Development of critical embedded systems, mobility and context-awareness Go to
  • Development of intelligent interactive systems: smart rooms, cars, clothes, offices and mobile phones. Go to
  • Development of secure and efficient software and hardware implementations Go to
  • Digital/electronic privacy Go to
  • Digital geometry processing Go to
  • Digital humanities Go to
  • Digital libraries and content syndication Go to
  • Digital libraries and repositories Go to
  • Digital libraries Go to
  • Digital libraries Go to
  • Digital media formats and standards Go to
  • Diophantine equations Go to
  • Discrete and computational mathematics Go to
  • Discrete applied mathematics Go to
  • Discrete applied mathematics Go to
  • Discrete geometry Go to
  • Discrete mathematics Go to
  • Discrete mathematics Go to
  • Discretization of space, time and value Go to
  • Distributed algorithms and systems Go to
  • Distributed algorithms Go to
  • Distributed algorithms Go to
  • distributed computability Go to
  • Distributed computing Go to
  • Distributed computing Go to
  • Distributed computing Go to
  • Distributed computing Go to
  • distributed computing systems Go to
  • Distributed information systems Go to
  • Distributed model checking Go to
  • Distributed query and dataflow processing Go to
  • Distributed systems design, queuing theory Go to
  • Distributed systems Go to
  • Distributed systems Go to
  • DISTRIBUTED SYSTEMS Go to
  • Distributed systems Go to
  • DISTRIBUTED SYSTEMS, INTERNET COMPUTING Go to
  • Distributed Systems Models (Process Calculi): semantics, behavioural equivalences, logics, verification Go to
  • Domain decomposition Go to
  • Domain theory Go to
  • Domain theory Go to
  • Dynamic adaptation of mobile applications Go to
  • Dynamic software product lines Go to
E
  • E-Commerce Go to
  • Efficient computer communication protocols Go to
  • e-Learning Go to
  • Electrical and computer engineering Go to
  • Electrical engineering Go to
  • Electronic commerce Go to
  • Electronic Design Automation (EDA) Go to
  • Electronic system level (ESL) design Go to
  • Elliptic PDE Go to
  • Embedded Software Go to
  • EMBEDDED SYSTEM DESIGN Go to
  • Embedded system design Go to
  • Embedded systems Go to
  • Embedded systems Go to
  • Embedded systems Go to
  • Embedded systems Go to
  • Embodied cognition Go to
  • Energy-efficient networking Go to
  • Energy informatics Go to
  • Engineering Adaptive Software, with focus on adaptive security and privacy Go to
  • Enhanced learning Go to
  • Ensemble Learning Go to
  • Enterprise computing systems Go to
  • Epidemic-based algorithm Go to
  • Error correcting codes Go to
  • e-Science Go to
  • eScience Go to
  • Estimation of distribution algorithms Go to
  • Evolutionary computation Go to
  • Evolutionary optimization Go to
  • Evolutionary reconstructions in Genomics Go to
  • Evolution of metabolic pathways and regulatory systems Go to
  • Execution visualization Go to
  • Experimental learning environments with animated characters Go to
  • Exponential sums over finite fields Go to
  • (extensions to) AADL, stochastic Petri nets, process algebras. Go to
  • Extremal combinatorics Go to
F
  • Fault tolerance Go to
  • Fault tolerant quantum computing Go to
  • Feature subset selection Go to
  • Finite Combinatorics Go to
  • Finite model theory Go to
  • Flexible database queries reflecting imprecise, bipolar, etc. user preferences and intentions Go to
  • Formal approaches to systems biology Go to
  • Formal language and automata theory Go to
  • Formal languages and automata Go to
  • Formal languages and automata Go to
  • Formal Languages Go to
  • Formal measures of quality: algorithms for quality checking, and automated synthesis of high-quality reactive systems Go to
  • Formal methods for specification, verification, and design of reactive systems Go to
  • Formal methods for synthesis and verification Go to
  • Formal methods Go to
  • Formal methods Go to
  • Formal methods Go to
  • Formal methods Go to
  • Formal methods in software engineering Go to
  • Formal models for distributed systems: Petri nets and process algebras Go to
  • Formal Power Series Go to
  • Formal semantics Go to
  • Formal topology Go to
  • Formal verification and synthesis of reactive systems Go to
  • Formal verification Go to
  • Formal verification of hardware and software Go to
  • Formal verification of processors and microkernels Go to
  • Foundational issues of algorithmic game theory Go to
  • Foundation and perception of informatics Go to
  • Foundation of distributed computation Go to
  • Foundations of computer science Go to
  • Foundations of concurrent processes Go to
  • Foundations of Mathematics and Computer Science: Finitely Supported Mathematics Go to
  • Foundations of object-oriented languages Go to
  • Foundations of quantum mechanics Go to
  • FOUNDATIONS OF QUANTUM PHYSICS Go to
  • FPT Go to
  • Free viewpoint rendering Go to
  • Functional genomics Go to
  • Fundamental investigations concerning (quantum) information Go to
  • Fundamental investigations in quantum physics, theory, experiments and paradoxes Go to
  • Fundamental principles that underlie the design and the construction of distributed systems Go to
G
  • Game-based approach to automatic verification and synthesis Go to
  • Game theory and mechanism design Go to
  • Game theory Go to
  • Game theory Go to
  • Game theory Go to
  • Gaudi software factory Go to
  • Generalized models of automata (over trees, pictures, relational structures) Go to
  • General logic, in particular, model theory and modal logic (correspondence theory, temporal logic, dynamic logic, epistemic logic) Go to
  • General purpose graphics processing units Go to
  • Genome sequence analysis Go to
  • Geoinformatics Go to
  • Geometric modeling Go to
  • Geometric modeling Go to
  • Geometric models of very large systems and assemblies Go to
  • Geometric reasoning Go to
  • Geometry processing Go to
  • Geometry processing Go to
  • Geometry processing Go to
  • Global program analysis/optimization/verification Go to
  • Gossip-based networking Go to
  • Grammars and rewriting systems Go to
  • Graph algorithms Go to
  • Graph algorithms Go to
  • Graph algorithms Go to
  • Graph algorithms Go to
  • Graphics systems Go to
  • Graph rewriting systems Go to
  • Graphs and networks Go to
  • Graph structure Go to
  • Graph-theoretic problem decomposition methods that can be used for recognizing large classes of tractable instances of hard problems Go to
  • Graph theory and algorithms Go to
  • Group theory Go to
H
  • Hardware Design Automation Go to
  • Hardware design Go to
  • Hardware-software co-design Go to
  • Hardware/software co-design Go to
  • Hardware/software interaction Go to
  • Healthcare informatics Go to
  • Heterogeneous Computing Go to
  • Heuristic algorithms Go to
  • High-order tensor data analytics Go to
  • High performance computers Go to
  • High performance computing Go to
  • High performance computing Go to
  • High Performance Computing (HPC) Go to
  • High-performance distributed applications in areas like search algorithms , multimedia, eScience, semantic web and model checking Go to
  • High quality audio coding Go to
  • History and prospects of informatics Go to
  • History of computing, especially programming theory Go to
  • History of mathematical sciences Go to
  • History of mathematics, especially practical calculation Go to
  • History of science, especially regional histories of science Go to
  • Homotopy type theory Go to
  • Human-computer interaction Go to
  • Human-computer interaction Go to
  • Human computer interaction Go to
  • Human motivation Go to
  • Hw Accelerators Go to
  • Hypermedia Go to
  • Hypermedia systems and personalization technology Go to
I
  • Identification of regulatory signals Go to
  • Identity and privacy management, including societal aspects of computer security, like electronic voting, privacy road pricing, e-ticketing (in public transport), smart electricity metering Go to
  • Image and video processing Go to
  • Image and video search Go to
  • Image processing and analysis Go to
  • Image processing Go to
  • Image processing Go to
  • Image synthesis and image based rendering Go to
  • Imaging Go to
  • Implementation of algorithms Go to
  • Incidence geometry (combinatorial and geometric configurations, maps and polytopes) Go to
  • Incremental software construction Go to
  • Indexing Go to
  • Inductive Logic Programming Go to
  • Industrial applications Go to
  • Industrial mathematics Go to
  • Industry4.0 applications Go to
  • Infinitary rewriting Go to
  • Infinite automata and applications in the verification of infinite systems Go to
  • Infinite words Go to
  • Informatics and simulation Go to
  • INFORMATICS, DISCRETE MATHEMATICS Go to
  • INFORMATICS Go to
  • Informatics Go to
  • Informatics Go to
  • INFORMATICS, OPERATIONS RESEARCH Go to
  • Information agents Go to
  • Information-centric networking Go to
  • Information extraction and knowledge harvesting Go to
  • Information extraction, sentiment extraction Go to
  • Information security Go to
  • Information security Go to
  • Information systems and databases Go to
  • Information systems modelling Go to
  • INFORMATION TECHNOLOGY Go to
  • Information theory Go to
  • Infrastructure engineering Go to
  • Initiator of membrane computing (details at http://ppage.psystems.eu) Go to
  • Integrated systems Go to
  • Intelligent inlormation systems Go to
  • Intelligent systems Go to
  • Interaction Go to
  • Interaction in Ambient Intelligence environments Go to
  • Interaction in pervasive environments Go to
  • Interaction techniques for augmented realities Go to
  • Interactive geometric modeling Go to
  • Interactive theorem proving Go to
  • Interconnection network architecture Go to
  • Interface between the life sciences and the physical sciences Go to
  • Interfaces computability, physics and biology Go to
  • Internet of Things Go to
  • Internet of Things Go to
  • Internet security and privacy Go to
  • Internet technologies and blockchain Go to
  • Internet technologies Go to
  • Internetworking Go to
  • Interoperability assessment Go to
  • Intersection and tolerance graphs Go to
  • Intersection types Go to
  • Invariant based programming Go to
K
  • Kernelization Go to
  • Key management - broadcast encryption security evaluation and design Go to
  • Knowledge discovery Go to
  • Knowledge engineering Go to
  • Knowledge management Go to
  • Knowledge management, representation and organization Go to
  • Knowledge representation and reasoning Go to
  • Knowledge Representation and Reasoning Go to
  • Knowledge representation and reasoning Go to
  • Knowledge representation and reasoning Go to
  • Knowledge representation Go to
  • Knowledge representation Go to
  • Knowledge representation Go to
  • KNOWLEDGE REPRESENTATION Go to
  • Knowledge representation Go to
  • Knowledge representation Go to
  • Kolmogorov complexity Go to
  • Kolmogorov complexity Go to
L
  • Lambda calculus and term rewriting Go to
  • Lambda calculus Go to
  • Lambda calculus Go to
  • Large distributed systems Go to
  • Large-scale economic data analysis, fusion and modeling the dynamics of economic systems Go to
  • Large-scale system modelling Go to
  • Layouts and morphisms on graphs Go to
  • Learning and clustering Go to
  • Learning theory Go to
  • Linguistic summaries of big data sets and applications in computer systems, business and finance, etc. Go to
  • Local computations Go to
  • Locating and fixing application performance bottlenecks Go to
  • Location theory - Operational research field where variables represent facility locations Go to
  • Logical aspects of computer science Go to
  • Logical semantics Go to
  • Logic an computer science Go to
  • Logic and automata theory Go to
  • Logic and complexity Go to
  • Logic and decision procedures Go to
  • Logic and finite model theory Go to
  • Logic and verification Go to
  • LOGIC Go to
  • Logic Go to
  • Logic Go to
  • Logic Go to
  • Logic in computer science Go to
  • Logic in computer science Go to
  • LOGIC IN COMPUTER SCIENCE Go to
  • Logic in computer science Go to
  • Logic in Computer Science Go to
  • Logic in computer science Go to
  • Logic in computer science Go to
  • Logic of computation Go to
  • Logic programming Go to
  • Logics and type theory Go to
  • Logics, formal methods Go to
  • Logics for specification and verification Go to
  • Logics of programs (dynamic logic) Go to
  • Logic synthesis Go to
  • Logistics of data processing Go to
  • Lower bounds Go to
  • Low-power system design Go to
M
  • Machine-code analysis Go to
  • Machine dynamics Go to
  • Machine learning Go to
  • Machine Learning Go to
  • Machine learning Go to
  • Machine Learning Go to
  • MACHINE LEARNING Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine learning Go to
  • Machine Learning Go to
  • Machine Learning (ML) and Data Mining (DM) Go to
  • Main-memory database technology for analytical and transactional workloads Go to
  • Management of large projects for industry Go to
  • Many-valued logic Go to
  • Marketing and management Go to
  • Markov regime models Go to
  • Massively parallel computing Go to
  • Mathematical economics Go to
  • Mathematical education: logic-based mathematics education, in particular for computer scientists Go to
  • Mathematical foundations of computer science Go to
  • Mathematical foundations of cryptography Go to
  • Mathematical logic and complexity theory Go to
  • Mathematical logic and its applications to computer science Go to
  • Mathematical logic Go to
  • Mathematical logic Go to
  • Mathematical logic Go to
  • Mathematical modelling in decision making Go to
  • Mathematical Programming Go to
  • Mathematical sciences communication Go to
  • Mathematical structures useful in computer science, in particular theory of 2-structures Go to
  • Mathematical tools for software engineering Go to
  • Mathematics and artificial intelligence Go to
  • MATHEMATICS & COMPUTER SCIENCE Go to
  • MATHEMATICS, COMPUTER SCIENCE Go to
  • Mathematics Go to
  • Mathematics of conflict Go to
  • MATHEMATICS, PHILOSOPHY, COMPUTING Go to
  • Matrix Theory Go to
  • MEDIA TECHNOLOGY Go to
  • Medical image processing Go to
  • Medical knowledge representation, in particular the formalisation of medical guidelines and medical trials Go to
  • Membrane computing Go to
  • Membrane Computing (Natural Computing) Go to
  • Metabolic reconstruction and functional annotation of genes and proteins Go to
  • Metagenomics Go to
  • Methodology and techniques of decision support, based on a junction of operations research and computational intelligence Go to
  • MICROELECTRONICS Go to
  • Microelectronics Go to
  • Microprocessor architecture Go to
  • Middleware Go to
  • Middleware Go to
  • Minima philosophica Go to
  • Mining Data Streams Go to
  • Mobile computing and communication Go to
  • Mobile computing Go to
  • Mobile computing Go to
  • Mobile data management Go to
  • (Mobile) social networks Go to
  • Modal and temporal logics Go to
  • Modal logic Go to
  • Modal logic Go to
  • Model-based and qualitative reasoning Go to
  • Model based testing Go to
  • Model checking Go to
  • Model checking Go to
  • Model checking Go to
  • Model-checking Go to
  • Model checking Go to
  • Model checking Go to
  • Model checking of probabilistic models, counterexample generation, abstraction, stochastic hybrid systems, timed automata Go to
  • MODEL CHECKING, SEMANTICS, PROBABILISTIC SYSTEMS Go to
  • Model-driven development Go to
  • Modeling and specification formalisms Go to
  • Modeling and verification Go to
  • Modeling computations in the living cell Go to
  • Modeling Go to
  • Modeling hybrid systems Go to
  • Modeling of uncertainty and imprecision in decision problems: rough set theory, fuzzy set theory Go to
  • Modelling and analysis of biological processes Go to
  • Models and languages for open distributed systems Go to
  • Models of biological systems Go to
  • Models of computation Go to
  • Models of computation: lambda-calculus, sequentiality models, synchronous concurrency models Go to
  • Models of sequential and parallel computational systems Go to
  • Model theory of mathematical logic Go to
  • Molecular and clinical data integration for precision medicine: patient stratification, biomarker discovery, drug re-purposing, disease re-classification Go to
  • Molecular computing Go to
  • Molecular networks: interactome evolution, dynamics, alignment, function prediction Go to
  • Molecular programming Go to
  • Motion Analysis Go to
  • MRMC (probabilistic model checker), libalf (learning communicating finite-state automata), COMPASS (AADL analysis tool-set) Go to
  • Multi-access Edge Computing Go to
  • Multiagent systems and agent-oriented software engineering Go to
  • Multi-agent systems Go to
  • Multi-agent systems Go to
  • Multi-agent systems Go to
  • Multi-core systems Go to
  • Multicriterial choice and decision making Go to
  • Multi-label classification Go to
  • Multimedia audio-visual database analysis Go to
  • Multimedia communication and networking Go to
  • Multimedia computing Go to
  • MULTIMEDIA, DATA SCIENCE Go to
  • Multimedia Go to
  • Multimedia Go to
  • Multimedia indexing and retrieval Go to
  • Multimedia information analysis Go to
  • Multimedia Security Go to
  • Multimodal analysis (physiological data, gaze, speech, gestures) Go to
  • Multi modal computing and interaction Go to
  • Multi-modal information systems Go to
  • Multiobjective optimization: evolutionary and interactive procedures Go to
  • Multiple criteria decision aiding, ordinal data mining, preference learning, knowledge discovery from big data Go to
  • Multiresolution Go to
  • Multiresolution modeling Go to
  • Multiscale dataflow processing Go to
  • Multistage optimal fuzzy control, notably using dynamic programming Go to
  • Multivariate algorithmics Go to
  • Multi view video processing Go to
N
  • Natural computation Go to
  • Natural computing (DNA Computing and Membrane Computing) Go to
  • Natural computing (DNA computing, membrane computing) Go to
  • Natural computing, including molecular computing, computation in living cells, self-assembly, and theory of biochemical reactions Go to
  • Natural language processing Go to
  • Negotiation and cooperation in mixed open environments (including humans) Go to
  • Network aware programming Go to
  • Network design Go to
  • Networked multimedia systems Go to
  • Networked systems, applications, and services Go to
  • Network Function Virtualization Go to
  • Networking Go to
  • Network measurements and traffic characterization Go to
  • Network performance debugging Go to
  • Network science Go to
  • Networks Go to
  • Networks-on-chip Go to
  • Neural Networks and Fuzzy Systems Algorithms and Control Go to
  • Neural networks Go to
  • Neural systems engineering Go to
  • Neurocomputing Go to
  • Neurocomputing Go to
  • Neurology Go to
  • Neuronal networks and machine learning Go to
  • Neuroscience applications Go to
  • Non-classical logics Go to
  • Nonlinear signal processing Go to
  • Non—monotonic and temporal reasoning Go to
  • Non-standard computing Go to
  • Numerical Algorithms Go to
  • Numerical analysis Go to
  • Numerical linear algebra Go to
  • Numerical methods and simulations Go to
O
  • Object-oriented programming Go to
  • Object-oriented programming, object technology Go to
  • Observing and surveillance Go to
  • On line algorithms Go to
  • Online knapsack problems Go to
  • Online randomized k-server problems Go to
  • Ontology engineering Go to
  • Ontology languages Go to
  • Ontology languages Go to
  • Ontology languages Go to
  • Operating system Go to
  • Operating systems Go to
  • Operating systems Go to
  • Operational Research Go to
  • Operations research Go to
  • Operations research Go to
  • Operations research Go to
  • Optical imagery analysis and learning Go to
  • OPTICAL IMAGERY Go to
  • Optical imaging Go to
  • Optimization Go to
  • Optimization of complex systems Go to
  • Ordered structures Go to
  • Originator of the Z notation Go to
  • Overcoming the Internet impasse via software defined networking and cloud networks Go to
P
  • P2P systems Go to
  • Packet switch architecture Go to
  • Parallel algorithms and models Go to
  • Parallel algorithms Go to
  • Parallel algorithms Go to
  • Parallel and distributed algorithms Go to
  • Parallel and distributed systems Go to
  • Parallel computing Go to
  • Parallel computing Go to
  • Parallelizing compilers Go to
  • Parallelizing compilers Go to
  • Parameterized complexity Go to
  • Particular probabilistic systems Go to
  • Pattern languages Go to
  • Pattern Recognition Go to
  • Pattern recognition Go to
  • Pattern recognition Go to
  • Peer-to-peer infrastructures Go to
  • Peer-to-peer networks and distributed retrieval Go to
  • Perceptual measurement techniques Go to
  • Perfect graphs Go to
  • Performance analysis Go to
  • Performance analysis of computer systems Go to
  • Performance and algorithms for databases Go to
  • Performance evaluation Go to
  • Performance modelling Go to
  • Personalization Go to
  • Pervasive computing systems Go to
  • Petri nets Go to
  • Petri nets Go to
  • Philosophy and history of mathematics and computer science Go to
  • Philosophy of computing Go to
  • Physical foundations of computation Go to
  • Point-based graphics Go to
  • Polygon mesh generation & optimization Go to
  • Polynomial, parameterized, approximation and exponential algorithms Go to
  • Power Aware Computing Go to
  • Predicting Structured Outputs Go to
  • Principles of database systems Go to
  • Principles of programming languages Go to
  • Probabilistic methods Go to
  • (Probabilistic) model checking Go to
  • Probabilistic model checking Go to
  • Probabilistic models of dynamic behaviour Go to
  • Probabilistic program analysis, pointer-manipulating programs (using graph grammars), parallel programming. Go to
  • Probabilistic verification Go to
  • Probability models in chemistry and physics Go to
  • Probability models in computer science and operations research Go to
  • Process algebra Go to
  • Process algebra Go to
  • Process algebra Go to
  • Process Algebras and their applications Go to
  • Process algebra, true concurrency semantics (event structures and message sequence charts), probabilistic process calculi Go to
  • Process description languages Go to
  • Process discovery Go to
  • Process management Go to
  • Process mining Go to
  • Processor Architecture Go to
  • Process science Go to
  • Professional life time management Go to
  • Program analysis and testing Go to
  • Program analysis Go to
  • Program analysis Go to
  • Program analysis Go to
  • Program correctness Go to
  • Programming environments for clusters, grids, clouds, heterogeneous and mobile systems Go to
  • Programming environments Go to
  • Programming environments Go to
  • Programming language design and implementation Go to
  • Programming languages for concurrent systems Go to
  • Programming languages for distributed systems Go to
  • Programming languages Go to
  • Programming languages Go to
  • PROGRAMMING LANGUAGES Go to
  • Programming languages Go to
  • Programming languages Go to
  • Programming methodology Go to
  • Program repair Go to
  • Program slicing Go to
  • Program verification and semantics Go to
  • Program verification Go to
  • Program verification Go to
  • Project scheduling, including multiple category resources, multiple job modes, multiple criteria and uncertainty. Go to
  • Proof and computational complexity theory Go to
  • Proof complexity Go to
  • Proof complexity Go to
  • Proof theory and recursion theory Go to
  • Proof theory Go to
  • Propositional proof complexity Go to
  • Psychoacoustics Go to
  • Public health Go to
Q
  • Quantitative analysis Go to
  • Quantum and classical cryptography Go to
  • Quantum automata Go to
  • Quantum circuits Go to
  • Quantum communication complexity Go to
  • Quantum communication complexity Go to
  • Quantum complexity theory Go to
  • Quantum computation, communication, teleportation and cryptography Go to
  • QUANTUM COMPUTATION Go to
  • Quantum computation Go to
  • Quantum computations Go to
  • Quantum computing Go to
  • Quantum computing Go to
  • Quantum computing Go to
  • QUANTUM COMPUTING Go to
  • Quantum cryptography Go to
  • Quantum entanglement and non-locality as new computation and communication resource Go to
  • Quantum information processing, quantum automata, entanglement and cryptography Go to
  • Quantum information processing resources ( entanglement, non-locality) Go to
  • Quantum Information Science Go to
  • Quantum information theory Go to
  • Quantum network coding Go to
  • Quantum optics, neutron interferometry, neutron, atom and molecule optics, mesoscopic physics Go to
  • QUANTUM PHYSICS Go to
  • Quantum physics Go to
  • Quantum query complexity Go to
  • Quantum randomness and quantum computing Go to
  • Quantum random walks Go to
  • Quantum teleportation Go to
  • Query languages and data models Go to
  • Query languages Go to
  • Query processing Go to
  • Query processing in databases and information systems Go to
R
  • Radar signal processing Go to
  • Randomized algorithms Go to
  • Randomized methods Go to
  • Randomized techniques in algorithmic and combinatorics Go to
  • Reaction systems Go to
  • Reactive, Real-Time, Synchronous programming Go to
  • Real-time scheduling Go to
  • Real-time systems Go to
  • Real-time systems Go to
  • Real-time systems Go to
  • Recommender systems Go to
  • Reconfigurable and adaptive computing systems Go to
  • Refinement calculus and its applications Go to
  • Representation of uncertainty and imprecision and applications in computer science, decision analysis, control, etc. Go to
  • Requirements engineering Go to
  • Resource-aware distributed execution and logical agents Go to
  • Rewrite systems Go to
  • ROBOTICS & ARTIFICIAL INTELLIGENCE Go to
  • Robotics Go to
  • Robotics Go to
  • Robustness issues in decision analysis Go to
S
  • Safety-critical embedded systems Go to
  • Sanity checks in formal methods: vacuity, coverage, and query checking Go to
  • SAT-based model checking Go to
  • Satisfiability Go to
  • Satisfiability problems Go to
  • Scalable information retrieval systems Go to
  • Scalable multicore systems: interprocessor communication and memory architecture Go to
  • Science fiction samples Go to
  • Science studies (transdisciplinarity) Go to
  • SCIENTIFC COMPUTING Go to
  • Scientific databases and data infrastructures, scientific experiment management Go to
  • Search and information retrieval Go to
  • Secure medical information architectures Go to
  • Security and privacy Go to
  • Security Go to
  • Security of physical systems Go to
  • SECURITY, PRIVACY, CRYPTOGRAPHY Go to
  • Security & Privacy Engineering, with focus on security requirements analysis, and mobile privacy Go to
  • Security vulnerabilities Go to
  • Self-adaptive and self-organizing software Go to
  • Self-managing and adaptive systems Go to
  • Self-managing software Go to
  • Semantic models for concurrency, probability and real-time Go to
  • Semantics and syntax of programming languages Go to
  • Semantics enactment and formalisation Go to
  • Semantics Go to
  • Semantics Go to
  • Semantics Go to
  • Semantics of computation Go to
  • Semantics of concurrency Go to
  • Semantics of coordination languages Go to
  • Semantics of parallel programming languages Go to
  • Semantics of programming languages Go to
  • Semantics of programming languages Go to
  • Semantics of programming, mathematical basis of computing, esp. coalgebra and quantum computing Go to
  • Semantic Web and Web 2.0 Go to
  • Semantic Web Go to
  • Semantic Web Go to
  • Semantic web Go to
  • Semantic Web Go to
  • Semantic Web, in particular handling distributed, large, heterogeneous, dynamic and possibly inconsistent information Go to
  • Semirings Go to
  • Semistructured data and XML Go to
  • Sensor networks Go to
  • Sequences Go to
  • Sequential and parallel computer architecture Go to
  • Service computing Go to
  • Service modeling Go to
  • Service-oriented computing Go to
  • Service-oriented computing Go to
  • Service oriented computing Go to
  • Session types Go to
  • Shannon entropy Go to
  • Shared memory Go to
  • Signal processing Go to
  • Simulation Go to
  • Smart cards, esp. Java cards, and their applications (e.g. in identity documents, public transport) Go to
  • Smart connectivity systems Go to
  • Smart energy Go to
  • Social Choice Theory Go to
  • Social Computing Go to
  • Social computing Go to
  • Social computing Go to
  • Social networking and trust Go to
  • Social Networks Go to
  • Social networks Go to
  • Societal implications of informatics Go to
  • Software and systems engineering centered around core topics of software and systems development Go to
  • Software architecture and component-based development Go to
  • Software architecture Go to
  • Software architecture Go to
  • Software architecture Go to
  • Software architecture Go to
  • Software architecture Go to
  • Software crowdsourcing Go to
  • Software-defined networking Go to
  • Software Defined Networks Go to
  • Software defined radio security Go to
  • Software development environments Go to
  • Software development Go to
  • Software Engineering Go to
  • SOFTWARE ENGINEERING Go to
  • Software Engineering Go to
  • Software engineering Go to
  • Software engineering Go to
  • Software engineering Go to
  • Software engineering Go to
  • Software engineering, with focus on requirements engineering Go to
  • Software evolution Go to
  • Software formal specification and verification Go to
  • Software Go to
  • Software libraries Go to
  • Software Model Checking Go to
  • Software specification and formal methods of software development Go to
  • Software specification Go to
  • Software System for Cloud Computing and Big Data Go to
  • Software systems engineering Go to
  • Software systems Go to
  • Softwaretechnology Go to
  • Software testing and debugging Go to
  • Software testing Go to
  • Software testing Go to
  • Software tools Go to
  • Software verification Go to
  • Sorting Go to
  • Spatial databases Go to
  • Spatio-temporal data management Go to
  • Specification and verication for security protocols and software Go to
  • Sport analytics applications Go to
  • Stable Matchings Go to
  • Static program analysis Go to
  • Static program analysis Go to
  • Statistical disclosure control Go to
  • Statistical methods for molecular biology Go to
  • Statistics and the environment Go to
  • Statistics education Go to
  • Statistics Go to
  • Statistics in ophthalmology Go to
  • Statistics of DNA sequences Go to
  • Stochastic behavioural modelling and verification Go to
  • Stochastic models Go to
  • Stochastic models in marine science Go to
  • Stochastic processes and their applications in engineering Go to
  • Stochastic processes in computer science Go to
  • Stochastic wave models Go to
  • Stream ciphers security evaluation and design Go to
  • Structural engineering Go to
  • Structural molecular biology Go to
  • Structural operational semantics and its meta-theory Go to
  • Subdivision surfaces Go to
  • Supercomputers Go to
  • Supercomputing Go to
  • Support for realtime/righttime-analytics in data-warehouse infrastructures Go to
  • Support of advanced analytics (mining, forecasting, etc.) in database systems Go to
  • Surveillance Go to
  • SWARM INTELLIGENCE Go to
  • Swarm intelligence Go to
  • Symbolic computation: automated theorem proving, formal methods for software, algorithm synthesis and verification, mathematical knowledge management Go to
  • SYMBOLIC COMPUTATION Go to
  • Symbolic computation Go to
  • (Symbolic) loop transformations and compilation Go to
  • Symmetric key cryptography Go to
  • Synchronization Go to
  • Synchronous programming of reactive systems Go to
  • Synthesis Go to
  • System and software requirements Go to
  • Systems and Cybernetics Go to
  • Systems biology and computational biomedicine Go to
  • Systems biology Go to
  • Systems biology Go to
  • Systems interoperability Go to
  • System software Go to
  • Systems-on-chip Go to
  • Systolic and cellular automata and systems Go to
T
  • Tableau algorithms Go to
  • Tangible and perceptive user interfaces Go to
  • Teaching mathematics and programming in high school Go to
  • Technology-enhanced learning Go to
  • Telematics in education Go to
  • Temporal and modal logics Go to
  • Temporal databases Go to
  • Temporal databases Go to
  • Temporal logic and model-checking Go to
  • Temporal logic Go to
  • Temporal logics Go to
  • Temporal logics Go to
  • Temporal reasoning Go to
  • Termination proofs Go to
  • Term rewriting Go to
  • Term rewriting systems Go to
  • Testing and verification Go to
  • Text algorithms Go to
  • The effective theory of infinite games Go to
  • The LPN (Learning Parity in Noise) problem Go to
  • The Lustre data-flow synchronous language Go to
  • Theorem proving Go to
  • Theoretical and practical aspects of concurrent systems specification and verification Go to
  • Theoretical Biology Go to
  • Theoretical computer science (finite automata, formal languages) Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • THEORETICAL COMPUTER SCIENCE Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • Theoretical computer science Go to
  • THEORETICAL INFOMATICS Go to
  • THEORETICAL INFORMATICS Go to
  • Theoretical models for wireless networks and sensor networks Go to
  • Theories for the origins and evolution of language using computer simulations Go to
  • Theory and application of concurrency in system design Go to
  • Theory of algorithms and complexity Go to
  • Theory of automata Go to
  • THEORY OF COMPUTATION Go to
  • Theory of computation Go to
  • Theory of computation Go to
  • Theory of computation Go to
  • Theory of computation Go to
  • Theory of concurrency Go to
  • Theory of concurrency Go to
  • Theory of concurrent systems Go to
  • Theory of concurrent systems, in particular theory of Petri nets, theory of transition systems, and theory of traces Go to
  • Theory of distributed systems Go to
  • THEORY OF FINITE AUTOMATA Go to
  • Theory of graph transformations Go to
  • Theory of programming Go to
  • Theory of programming Go to
  • Theory of synchronous algorithms with digital and analogue components, and its applications Go to
  • The relation between automata and logical systems Go to
  • Three-dimensional graphics and realism Go to
  • Tilings Go to
  • Time-frequency analysis Go to
  • Timing analysis Go to
  • Timing guarantees for hard real-time systems Go to
  • Tone mapping and high dynamic range imaging Go to
  • Topology Go to
  • Topology Go to
  • Total quality management Go to
  • Transcriptional regulation Go to
  • Transportation engineering Go to
  • Type systems and semantics Go to
  • Type theory Go to
  • Type theory Go to
  • Type theory Go to
  • Type theory Go to
  • Type theory Go to
U
  • Ubiquitous computing Go to
  • Unification theory Go to
  • Universal access/design for all Go to
  • Unstructured text analysis Go to
  • Use of natural language in the representation of systems and reasoning schemes, notably via computing with words and natural language generation Go to
  • User interfaces Go to
  • User modeling, adaptation, personalization, profiling, contextualization Go to
  • User preferences and personalization Go to
V
  • Variable Neighborhood Search - general heuristic for solving optimization problems Go to
  • Variational Methods for Computer Vision Go to
  • Verification and validation Go to
  • Verification Go to
  • Verification Go to
  • Verification Go to
  • Verification of numerical software by means of sound, but approximate methods Go to
  • Verification of sequential and concurrent programs Go to
  • Verification of systems with infinitely many states Go to
  • Verified software Go to
  • Very large scale Knowledge Representation, in particular inference over very large knowledge bases Go to
  • Video processing and coding Go to
  • Video-streaming Go to
  • Video surveillance Go to
  • Virtual distributed systems Go to
  • Virtual reality Go to
  • Virtual reality Go to
  • Visual computing Go to
  • Visual computing Go to
  • Visual Learning Go to
  • VLSI design Go to
  • VLSI systems Go to
  • Volume and Octree representations Go to
W
  • Wave field synthesis Go to
  • Wearable and mobile computing systems Go to
  • Web data management Go to
  • WEB & DATA MANAGEMENT Go to
  • Web data management Go to
  • Web data processing and data extraction Go to
  • Web information retrieval Go to
  • Web science Go to
  • Weighted automata and quantitative logics Go to
  • Wireless sensor network and ambient intelligence Go to
X
  • XML and semi-structured information Go to
Imprint Privacy policy « This page (revision-5) was last updated on Wednesday, 20. March 2019, 12:29 by System
  • operated by