index - ADAptive Computing Access content directly

The ADAC team , whose mission is the design of adaptive systems and components capable of self-managing to optimize performance, conducts research on the exploration, simulation, and definition of innovative embedded hardware and software architectures, with a focus on the systems’ on-line adaptation to their environment. These strategies aim to optimize system performance in terms of energy efficiency, compliance with application constraints, safety or reliability. This work is based on integrated parallel (multi-core and multi-processor systems) or distributed (grids, sensor networks) computing and attempts to integrate the use of non-volatile emerging technologies such as magnetic memories (MRAM) with new properties.

Significant resources are committed to the definition of the various facets of adaptive systems such as measurement (sensors), data fusion/integration, online decision-making and actuation (task migration, among others). This work is contextualized in various application domains ranging from IoT to intensive computing and digital security.

Open Access Files

79 %

Number of full texts


Number of records


Publishers' policy on open archives

Mapping of collaborations


Gateway Decentralized network FPGA Resource allocation Data centre Education Deep Learning Renewable energy Reliability Distributed systems Error analysis Energy efficiency Neural networks DRAM Modeling Processor scheduling Side-channel attacks STT-MRAM Design Space Exploration Silent stores Design methodology Multicore systems Energy Power Monitoring Quantization PQC Physically unclonable function Monitoring Data Distribution Service Architecture Delays Convolutional Neural Network Machine learning Internet of Things Generative Adversarial Network Multicore processing Detection Sustainability Fog computing Performance evaluation IoT Resistive RAM Caches OpenMP Embedded System Parallel programming languages MRAM Internet des Objets Multi-threaded programs Network-on-Chip Hardware security Deep Neural Networks Design space exploration Privacy Rowhammer Power demand Cryptography Analog Deep learning Computer architecture Performance Multiprocessing systems Memory architecture Gem5 Embedded systems Scheduling M2M Power Energy-efficiency Edge computing BigLITTLE Computer vision Non volatile memory Hardware Accelerator Mitigation Efficacité énergétique Security Network-on-chip Simulation Magnetic RAM RO frequency Adaptation Approximate Computing Model Compression Blockchain Adaptive systems Architecture mémoire Weight Sharing FPGA security Approximate computing Memory hierarchy Hardware Machine Learning Gem5 simulator Microarchitecture Lightweight cryptography Framework IP Protection Parameter exploration RSA