1. Datalog Reasoning and Explanation
    David Carral (david.carral@inria.fr) - Inria/LIRMM Montpellier
    1-39, 2.26.1
  2. Hybrid Reasoning Over Heterogenous Data
    federico ulliana (federico.ulliana@inria.fr)
    1-39, 2.26.1
  3. Signatures post-quantiques fond´ees sur le MPC-in-the-Head
    Zoé Amblard, Aurélien Dupin, Thomas Ricosset
  4. Algorithme d'Euclide en temps constant pour la cryptographie
    Simon Abelard, Valentin Vasseur - Gennevilliers (92)
  5. Flux d'information et analyse de pureté: application à l'initialisation non-ambiguë de modules OCaml
    Benoît Montagu, Thomas Jensen, Épicure team, Inria Rennes
    2.4, 2.6
  6. Schnyder woods for higher genus surfaces, with application to graph drawing
    Luca Castelli Aleardi, Ecole Polytechnique (LIX)
    2.38.1, 2.10
  7. A COMMON FUTURE FOR TOURISM AND WATER RESOURCE: THE CASE OF CAT BA ISLAND
    Paul Bois / Cédric Gaucherel - Internship in Strasbourg
  8. Semantics and Implementation of Actors in Multicore OCaml
    Gabriel R ADANNE, Ludovic Henrio, Inria CASH/LIP
  9. Graphical Reasoning, in Coq
    Gabriel RADANNE, Yannick ZAKOWSKI – Inria CASH/LIP
  10. Compiler Intermediate Representation for Algebraic Data Types
    Gabriel RADANNE, Laure Gonnord – Inria CASH/LIP
  11. CFG Patterns: A new tool to formally verify optimisations in Vellvm
    Gabriel RADANNE, Yannick ZAKOWSKI – Inria CASH/LIP
  12. Cooperative task scheduling and synchronization
    Jean-Pierre Lozi - Inria Paris
  13. Graphical Language for Clifford Hermiticians in Quantum Computing
    Renaud Vilmart - LMF, Saclay
    Quantum information
  14. Types for complexity analysis in a process calculus
    Patrick Baillot - CRIStAL (Villeneuved'Ascq / Lille)
    2.3.1, 2.4
  15. Implicit computational complexity in Pi-calculus
    Patrick Baillot - CRIStAL (Villeneuved'Ascq / Lille)
    2.3.1, 2.4
  16. Research Internships @ Max Planck Institutes in Computer Science
    MPI-SP (Bochum), MPI-SWS (Saarbrucken and Kaiserslautern), MPI-INF (Saarbrucken)
  17. Symétries et extensions des intervalles de Tamari à travers des bijections
    Wenjie Fang et Éric Fusy - LIGM, Univ. Gustave Eiffel (Marne-la-Vallée)
    2.10, 2.15
  18. Catalan number and cylindric paritions
    Sylvie Corteel, Universite Paris Cite, corteel@irif.fr
    C2-10, C2-15
  19. Semantics and types for synchronous programming with state machines in a multi-periodic setting
    Patrick Baillot, Julien Forget, Sylvain Salvati - CRIStAL (Villeneuve d'Ascq / Lille)
    2.23.1, 2.4.2
  20. Algorithmique des isogénies de variétés abéliennes et cryptographie post-quantique
    Pierre-Jean Spaenlehauer (pierre-jean.spaenlehauer@inria.fr) - Inria Nancy, équipe CARAMBA
    Cryptologie, calcul formel.
  21. Interopérabilité vérifiée entre OCaml et C
    Armaël Guéneau - LMF, Saclay
    2.36.1
  22. The compositional structure of indefinite causal order
    Augustin Vanrietvelde - Inria Saclay
  23. Cybersecurity and Safety analysis by Abstract Interpretation with Frama-C / Eva
    Valentin Perrelle, CEA LIST, Palaiseau
    2.6 Abstract interpretation
  24. Types for sensitivity analysis and differential privacy in functional programming
    Patrick Baillot - CRIStAL (Villeneuved'Ascq / Lille)
    2.1, 2.3.2, 2.4
  25. Type invariants and ghost code for deductive verification of Rust code
    Jacques-Henri Jourdan - LMF Université Paris-Saclay
    2.4, 2.7.2, 2.36.1
  26. Synthesizing coalition strategies in parameterized concurrent games
    Patricia Bouyer, LMF, Saclay
    2.20.1 - 2.8.1
  27. Verification of security protocols - application to e-voting
    Stéphanie Delaune & Joseph Lallemand, IRISA (Rennes)
    2.30
  28. Implementation of hierarchies of algebraic structures in type theory
    Assia Mahboub, Cyril Cohen – Inria/LS2N, Nantes
    2.7.1, 2.7.2,2.4
  29. Vérification formelle de primitives cryptographiques post-quantiques
    Tristan Ninet, Thomas Ricosset, Eric Sageloli, Aymeric Fromherz - Gennevilliers (92)
  30. Reinforcement learning techniques for Multi-agent path finding with imperfect information
    Jilles Dibangoye, Ocan Sankur, François Schwarzentruber - Univ. Rennes, Irisa, Rennes
  31. Treillis de Tamari et arbres de parking
    Bérénice Delcroix-Oger - Matthieu Josuat-Vergès
  32. Faithful Nash equilibria in games over graphs
    Dietmar Berwanger, Patricia Bouyer
    2.20.1
  33. Formally verified optimizations for safety-critical embedded code
    David Monniaux & Sylvain Boulmé, VERIMAG
  34. Model Checking for Malware (Virus) Detection
    Tayssir Touili - Le Laboratoire d'Informatique de Paris-Nord (LIPN)
  35. Security counter-measures in a certified optimizing compiler
    David Monniaux & Sylvain Boulmé, VERIMAG
  36. Verified hash tables and hash-consing
    David Monniaux & Sylvain Boulmé, VERIMAG
  37. Static analysis of “pseudo-LRU” caches
    David Monniaux & Claire Maïza, VERIMAG
  38. Proof system interoperability
    Frédéric Blanqui - LMF
  39. Developing an Iris-Based Program Verification Framework for OCaml
    François Pottier, Inria Paris et Armaël Guéneau, Inria Saclay
    2.36.1, 2.7.1, 2.7.2
  40. Open Automata meet Session Types
    Ludovic Henrio, Inria CASH/LIP, Rabea Ameur-Boulifa, LTCI/Telecom Paris
  41. A type safe quantum programming language for quantum control and indefinite causal orders
    Romain Péchoux & Simon Perdrix
    2.34.1 2.1 2.4
  42. Reasoning with hard and soft constraints to repair and query inconsistent data
    Meghyn Bienvenu + Camille Bourgaux - LaBRI, Bordeaux
    Web data management
  43. Implémentation d'attaques cryptographiques
    ANSSI Crypto Lab, Paris 15
  44. Introduction of timing aspects into Event-B
    Amel Mammar, Idir Ait-Sadoune, Télécom SudParis, SAMOVAR/METHODES, Paris-Saclay University, LMF
  45. Introduction of timing aspects into Event-B
    Amel Mammar, Idir Ait-Sadoune - Télécom Sud-Paris & Centrale-Supélec
  46. Vérification automatique pour la sûreté des systèmes
    David CHEMOUIL (ONERA DTIS, Université de Toulouse)
  47. Extensions de la méthode formelle Alloy d’analyse de systèmes
    David CHEMOUIL (ONERA DTIS, Université de Toulouse)
  48. Towards Law versioning: a double category of XML files
    Luc Pellissier — LACL, Université Paris Est Créteil
    2.2 2.4
  49. Multi-objective optimization for the vehicule rescheduling problem
    François Schwarzentruber, Ocan Sankur
    2.24.1, 2.24.2
  50. Static Analysis under a Given Time Budget
    Raphaël Monat – Inria @ University of Lille
    2.6
  51. Incremental Static Analysis
    Raphaël Monat – Inria @ University of Lille
    2.6
  52. Distilling Bell-nonlocality for quantum cryptography
    Jean-Daniel Bancal, Peter Brown and Mirjam Weilenmann – IPhT CEA Saclay and LTCI Télécom-Paris
    2.34.1, 2.34.2 (and tangentially 1-37 convex optimization)
  53. Feerated learning with untrusted server
    Jan Ramon - INRIA-Lille
    cryptography
  54. Parameterized complexity : A tool to handle multiobjective problems
    Julien Baste; Laetitia Jourdan; Université de Lille
    2.11.1 Parameterized Complexity
  55. Safety Analysis of Real-Time Discrete-Event and Hybrid Systems
    Philippe Dague et Lina Ye - LMF, Université Paris-Saclay
    2.8.2
  56. Centres and Commutants of Strong Monads
    Vladimir Zamdzhiev, Louis Lemonnier - LMF, Université Paris-Saclay
    2.2
  57. Cybersecurity high assurance Software
    Yacine Bouguechal - Thales Gennevilliers
  58. Query-Directed Width Measures for Probabilistic Graph Homomorphisms
    Antoine Amarilli and Mikaël Monet - Télécom Paris or Inria Lille
  59. Design and Implementation of User-Friendly Concurrent Processes Description Language, and CTL* Model-Checker
    Vincent Hugot & Pascal Berthomé – INSA CVL, campus de Bourges
    Automata and Formal Languages, System Programming, Analysis, and Verification
  60. Infinite Structures for Program Verification
    Aymeric Fromherz and Théo Laurent, INRIA Paris
  61. Semantics of Boolean Networks
    Philippe Dague et Thomas Chatain - LMF, Université Paris-Saclay, CNRS, ENS Paris-Saclay
  62. Ordered algebraic data types in systems programming languages
    Guillaume Munch-Maccagnoni, Inria, Nantes
    2.4, (2.2, 2.1)
  63. Real-time analysis and verification of ROS2 robotic applications
    M. Foughali; P-E Hladik. LS2N (Nantes) & IRIF (Paris)
  64. History-Deterministic Timed Automata
    Uli Fahrenberg, Nicolas Markey – IRISA, Univ. Rennes
    2.8.2, 2.20.1
  65. Security ceremonies
    Barbara FILA, IRISA, France
    formal modeling, security protocols, formal methods, security, verification
  66. Vérification formelle de logiciels critiques en instrumentation spatiale
    Hai Nguyen Van, Xavier Thirioux, ISAE-SUPAERO, Toulouse
    2.5.1., 2.6, 2.7.2, 2.23.1
  67. Energy/performance tradeoff of ML-enhanced high-speed networks
    Leonardo LINGUAGLOSSA - Telecom Paris (Institut Polytechnique de Paris)
  68. Decentralized Clustered Federated Learning
    Giovanni Neglia - Sophia Antipolis
  69. Federated Learning for Heterogeneous Model Architectures
    Giovanni Neglia, Inria, Sophia Antipolis
  70. Question Answering With Open Knowledge Bases
    Julien Romero, Oana Balalau. Location: Télécom SudParis, Palaiseau
  71. Deep Graph Neural Networks (GNNs) and Applications
    Fragkiskos Malliaros (CentraleSupelec, Inria) and Jhony Giraldo (Telecom Paris, IP Paris)
  72. Reliable numerical integration
    Joris van der Hoeven, Grégoire Lecerf, LIX, Polytechnique
    Advanced complexity, Software engineering, Polynomial systems, computer algebra and applications, Efficient algorithms in computer algebra,
  73. Formal Methods for the Verification of Self-Adapting Distributed Systems
    Radu Iosif, Arnaud Sangnier - Verimag, Grenoble