Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
amounts of clinical data are needed to train useful AI algorithms. However, patient data are person-sensitive, and only selected individuals can obtain access, which can be a significant roadblock for
-
We are offering a PhD position in the field of algorithmic graph theory. The position is a full-time employment with a competitive monthly salary and full social benefits for up to five years. You
-
of Artificial Intelligence in Green Algorithms Research line / Scientific-technical services: Development of algorithms that are energy-efficient. Project data Title: UDC-Inditex Chair of Artificial Intelligence
-
write your thesis in the context of the research project ‘Tracing the Realities of Algorithmic Warfare: From Innovation to Deployment and its Impact on Civilian Harm,’ funded by the Research Foundation
-
Description The Chair of Transport Modelling and Simulation at TUD Dresden University of Technology is investigating models, algorithms and simulations to achieve an enhanced scientific
-
Post doc position in theory of machine learning at Department of Computer Science, Aarhus University
is on understanding and improving the performance of classic learning algorithms, in particular Boosting and Bagging, both in terms of speed and generalization capabilities. The project also allows
-
methods may include physical models, multivariable analysis, self-diagnosis, and AI algorithms. Given the importance of long operating times for underwater sensors, energy-efficient processing is central to
-
other PhD projects within SFI Smart Ocean. These methods may include physical models, multivariable analysis, self-diagnosis, and AI algorithms. Given the importance of long operating times for underwater
-
contributions to standardisation efforts. Your role This fully funded PhD position focuses on exploring and developing hybrid quantum-classical algorithms to tackle sustainability challenges. Key areas include
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold