Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
: Develop real-time optimization and hybrid AI models for end-to-end multimodal transport planning under uncertainty. Design synchronization, consolidation, and matchmaking algorithms that align prefab
-
). N.B. When applying for the position we want you to provide a personal letter (first field in the application form). This letter should contain a paragraph where you briefly explain/list
-
provide a personal letter (first field in the application form). This letter should contain a paragraph where you briefly explain/list the qualifications that you believe are particularly relevant
-
high dynamic range (HDR) imaging is redefining the way smartphone cameras and displays capture the world. Despite HDR becoming the new standard, many classic image-processing algorithms and generative
-
network Research Fields: Hormones, Digital Health, Medical Sensors, Physiology Secondments: University of Ulm (Germany): Algorithms for wearable data analysis University of Manchester (UK): Mathematical
-
adaptation of the mesh during simulation to resolve and track features in the flow. The focus of your PhD would be on developing novel algorithms to efficiently redistribute and rebalance the parallel
-
Medicine Secondments: University of Ulm (D): To work with algorithms for wearable data University of Manchester (UK): To learn mathematical modelling of hormone rhythms. University of Bristol (UK): To learn
-
training courses and workshops of the ENDOTRAIN network Research Fields: Hormones, Digital Health, Medical Sensors, Physiology Secondments: University of Ulm (Germany): Algorithms for wearable data analysis
-
» Algorithms Mathematics » Computational mathematics Mathematics » Mathematical logic Researcher Profile First Stage Researcher (R1) Country Netherlands Application Deadline 16 Feb 2026 - 22:59 (UTC) Type
-
Algorithmic Categorization”, 2024.07707.IACDC supported by measure “RE-C05-i08.m04 – “Support the launch of a program of R&D projects aimed at the development and implementation of advanced cybersecurity