Institut de Recherche en Informatique Fondamentale (IRIF)

CNRS

Université Paris Cité

IRIF is a research laboratory of CNRS and Université Paris Cité, also hosting one Inria project-team.

The research conducted at IRIF is based on the study and understanding of the foundations of all computer science, in order to provide innovative solutions to the current and future challenges of digital sciences.

IRIF hosts about 200 people. Seven of its members have been distinguished by the European Research Council (ERC), six are members of the Institut Universitaire de France IUF), two are members of the Academia Europæa, and one is member of Académie des sciences.

Follow us on Twitter/X, LinkedIn and Mastodon for our latest news:

LinkedIn Twitter/X Mastodon

@Collège de France

4.11.2025
The next “On éteint, on réfléchit, on discute” conference will take place on Tuesday, November 18th. It will focus on AI.

Reminder: these conferences are intended for students of the Faculty of Information Sciences, but not exclusively, anyone interested is welcome to attend.

AI: beyond the hype, what are the realities? In recent years, AI has been making headlines: every six months, we hear about technological revolutions, the imminent disappearance of most jobs, colossal investments (in the hundreds of billions of dollars), applications for just about everything, superhuman intelligence in most fields… Beyond the bombastic rhetoric, we will try to demystify and take stock of this phenomenon. What scientific advances in AI have been made in recent years? How can we decipher the media narrative on AI? What kind of society and planet does AI really promise us?

With: Claire Mathieu, CNRS Research Director at IRIF, and Thibault Prévost, journalist and author of “Les prophètes de l'IA. Pourquoi la Silicon Valley nous vend l'apocalypse” (Lux, 2024).

Démystifier le quantique, la chaire médiation de l’IUF de Sophie Laplante

24.10.2025
Read Sophie Laplante's interview (in french) “Démystifier le quantique, la chaire médiation de l’IUF de Sophie Laplante

Village des sciences de l'Université Paris-Cité

9.10.2025
On Friday, October 10 and Saturday, October 11, IRIF will participate in the Paris-Cité University Science Village.

Come discover IRIF, meet our scientists, and participate in our unplugged computer science workshops.

https://malinca.gitlabpages.inria.fr/malinca.gitlab.io/events-kickoff/

30.9.2025
MALINCA (Mathematicae Lingua Franca) aim to develop proof assistant technologies of an entirely new nature, including a formal language and a foundational approach to mathematical meaning, with the versatility necessary to represent the dynamic linguistic structures to be found in the daily practice of mathematics.

Bridging the Linguistic Gap Between the Mathematician and the Machine The kickoff meeting will be held at the Institut Henri Poincaré on October 1-3, 2025.

https://www.tcs4f.org/

26.9.2025
Thomas Colcombet and Hugo Férée from IRIF, launch with TCS4F (theoretical computer science for future) “low-co2 research paper”, which offers graphic tools and rules to mention on research works that the carbon cost of said research and its dissemination is low.

You can find out more on this page

Delia Kesner's Festschrift

30.9.2025
On September 12, IRIF organized Delia Kesner's Festschrift. It was also to celebrate Delia Kesner's research career (and her birthday!).

(These news are displayed using a randomized-priority ranking.)

Automata
Friday November 7, 2025, 2PM, Salle 3052
Alexandra Rogova Finite vs Infinite – Why not both? Partially Finite Entailment in Description Logics

A knowledge base is a database together with an ontology, which contains rules that can be used to infer new facts not explicitly present in the data. In the general case, this fact-generating procedure can run forever, creating infinitely many versions of the original database of possibly infinite size. When answering queries, all these possible worlds must be considered when computing the result. This version of query answering is called “query entailment”. More formally, we say that a query is entailed by a database if it is true in all of its extensions.

To bring query entailment closer to database theory-style query answering, where the data is always finite, a finite version of query entailment has been considered for many classes of queries and rule languages. In the context of “finite query entailment”, a query is said to be entailed by a database if it is true in all of its finite extensions. Unfortunately, this finite semantics can lead to a loss of intended meaning, creating nonsensical databases that do not correspond to the user's intuition.

In this talk, I will introduce a new partially finite semantics, and its corresponding “partially finite query entailment” problem, that aims to reduce the disparity described above by allowing users to choose which part of the data must remain finite. I will show how the problem differs from its unrestricted and finite variants, and that it does not cause an increase in computational complexity, for the logic S.

The talk will contain an introduction to the query entailment formalism and should be accessible to those without a background in Description Logics/Knowledge representation.

Realizability toposes
Friday November 7, 2025, 3PM, Salle 3063
Sara Rousta Andrew Swan's notes on intuitionistic logic IV

Verification
Monday November 10, 2025, 11AM, Salle 3052
Shijie Lin (IRIF) Reachability Analysis of Upper-Stack manipulating Binary code

In this talk, we tackle the reachability analysis problem of binary code that manipulate the part of memory that is just above the stack pointer. To model such programs, we use Upper Stack PushDown Systems (UPDS), an extension of Pushdown systems (PDS), to simulate the stack operations of assembly codes. UPDS is a kind of PDS with two stacks called upper stack and lower stack where the lower stack works as a normal PDS stack and the upper stack works as the memory space above the stack. We propose several algorithms to perform the reachability analysis of this model. To this aim, we represent regular potentially infinite sets of configurations using finite state automata. The reachability sets of UPDSs being in general not regular, we propose two semi-algorithms for computing accurately the sets of predecessors pre* and successors post* of regular sets of configurations of UPDS. We provide interesting subclasses for which our semi-algorithms are guaranteed to terminate. We show that our approach has several interesting applications like stack overflow detection, stack string detection, return address anomaly detection, etc.

This is a joint work with Tayssir Touili.

Formath
Monday November 10, 2025, 2PM, 3052
Gabriella Clemente Géométrie différentielle à travers les assistants de preuve

Almost-complex geometry is the study of spaces that lie between the complex and real ones. In the smooth category, it becomes a refinement of real differential geometry and an extension of complex differential geometry. Although there are numerous results in the field, almost-complex geometry does not yet have a clear theory unlike its real and complex counterparts. I will discuss an almost-complex specialization/extension program that we will implement with a proof assistant through an example, namely the Taylor series of a metric in normal coordinates. The Taylor coefficients are related to the curvature of the metric, which illustrates the general phenomenon of curvature obstructing the integrability of a geometric structure.

Algorithms and complexity
Wednesday November 12, 2025, 11AM, Salle 3052
Amin Shiraz Gilani (University of Maryland) Hiding, Shuffling, and Cycle Finding: Quantum Algorithms on Edge Lists

The edge list model is arguably the simplest input model for graphs, where the graph is specified by an unordered list of its edges. In this model, we study the quantum query complexity of k-cycle finding, and its connections with k-distinctness. Specifically, given any graph with low maximum degree, such as a typical random sparse graph, we prove that the quantum query complexity of finding a length-k cycle in its length-m edge list is m^{3/4-1/(2^{k+2}-4) ± o(1)}, which matches the best-known upper bound for the quantum query complexity of k-distinctness on length-m inputs up to an m^{o(1)} factor. We prove the lower bound by developing new techniques within Zhandry's recording query framework (cryptology eprint: 2018/276) as generalized by Hamoudi and Magniez (arxiv: 2002.08944). These techniques extend the framework to treat any non-product distribution that results from conditioning a product distribution on the absence of rare events. We prove the upper bound by adapting Belovs's learning graph algorithm for k-distinctness (arxiv: 1205.1534). Finally, assuming a plausible conjecture concerning only cycle finding, we show that the lower bound can be lifted to an essentially tight lower bound on the quantum query complexity of k-distinctness, which is a long-standing open question.

Enumerative and analytic combinatorics
Thursday November 13, 2025, 11AM, Salle 4071
Hadrien Notarantonio (LaBRI – IRIF) To be announced.

Proofs, programs and systems
Thursday November 13, 2025, 10AM, Salle 3052
Damien Pous (CNRS, ENS Lyon, LIP) To be announced.

PhD defences
Thursday November 13, 2025, 12:30AM, Salle 3052, Bâtiment Sophie Germain
Adrienne Lancelot (IRIF) Comparing functional programs, or how to put λ-terms back in order

Program equivalence is a central topic in the study of programming languages. Certifying that compiler transformations do not change the semantics of a program is needed to formally prove correct compilers.

This thesis aims at further developing the theory of program equivalences for the untyped pure λ-calculus, on several viewpoints.

We suggest to switch from program equivalences to program preorders, which is a usual switch in the study of programming languages but perhaps not something fully accepted at the level of the λ-calculus. We show that some central concepts in the λ-calculus may be reformulated to simple properties on preorders for λ-terms.

Contextual equivalences are the most natural notion of comparison for programs: contextual comparison is about testing programs in any execution environment and checking that they behave in a similar way. This equivalence is mostly unusable to provide proof of equivalences for expressive enough programming languages, because of the universal quantification over execution environments—akin to testing for all possible inputs.

We introduce a quantitative refinement of contextual equivalence, trying to obtain a cost-sensitive program equivalence as natural as contextual comparison. Interaction equivalence tests programs in any execution environment, checks that their behavior is similar but also takes into account the number of communications (or interactions) between the program and its environment.

Finally, we explore program equivalences for another evaluation paradigm, namely call-by-value. Call-by-value is more efficient and closer to the actual evaluation mechanism used by programming languages despite it being less studied than the original evaluation of the λ-calculus. It leads to a wide range of program equivalences, usually studied with effects added to the language. We study it here in a pure setting and show that call-by-value is a rich framework with many different notions of equivalences.

We provide a unifying view of all these program equivalences and their main properties, abstracting over the evaluation mechanisms considered.

Non-permanent members' seminar
Friday November 14, 2025, 11AM, Salle 3052
Shamisa Nematollahi (IRIF) Economy of Scale in Algorithm Design: ​Approximation Algorithms for Submodular Optimization and Network Design ​

​The economy of scale principle, where the cost per unit decreases as the scale of operation increases, is a foundational concept in economics. It naturally arises in diverse real-world systems, from logistics and infrastructure planning to data summarization and information propagation. In such systems, grouping resources, demands, or actions often leads to more efficient outcomes. This behavior is reflected in mathematical models through properties such as submodularity, which captures diminishing returns on the value side, and subadditive capacity cost functions, which formalize buy-at-bulk effects on the cost side. In submodular optimization problems, the economy of scale appears as diminishing marginal gains: each additional element contributes less marginal gain as the solution grows. This framework captures key phenomena, including information redundancy and influence propagation. In the buy-at-bulk facility location problem, the economy of scale manifests on the cost side: satisfying a larger demand becomes cheaper per unit due to amortized setup costs. By leveraging this shared structure, this thesis explores the design of approximation and streaming algorithms for these two classes of problems that capture the principle of economy of scale. We develop algorithmic techniques with provable performance guarantees for problems with complex constraints, across different computational models. These results contribute to the broader understanding of scalable algorithms for decision making tasks where gains or costs exhibit diminishing return structures.

Verification
Monday November 17, 2025, 11AM, Salle 3052
Olzhas Zhangeldinov LTL Model Checking of Concurrent Self Modifying Code

We consider the LTL model-checking problem of concurrent self modifying code, i.e., concurrent code that has the ability to modify its own instructions during execution time. This style of code is frequently utilized by malware developers to make their malicious code hard to detect. To model such programs, we consider Self-Modifying Dynamic Pushdown Networks (SM-DPN). A SM-DPN is a network of Self-Modifying Pushdown processes, where each process has the ability to modify its current set of rules and to spawn new processes during execution time. We consider model checking SM-DPNs against single indexed LTL formulas, i.e., conjunctions of separate LTL formulas on each single process. This problem is non trivial since the number of spawned processes in a given run can be infinite. Our approach is based on computing finite automata representing the set of configurations from which the SM-DPN has a run that satisfies the single-indexed LTL formula. We implemented our techniques in a tool and obtained promising results. In particular, our tool was able to detect concurrent, self-modifying malware.

This is a joint work with Tayssir Touili.