Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
the UKRI through the Frontier Guarantee Programme to Dr Jani R Bolla. The work is to be conducted in his lab in the Department Biology, University of Oxford, South Parks Road, Oxford, OX1 3RB
-
for parallelism in the tensor completion process to enhance computational efficiency. Investigate parallel algorithms and architectures that can exploit the inherent parallelism in tensor operations. Collaboration
-
buildings closed days (and Christmas Eve when it falls on a weekday) for all full time staff. Use our total rewards calculator: https://www.hw.ac.uk/about/work/total-rewards-calculator.htm to see the value
-
experts across system software, power management infrastructure, performance characterization, networking, and novel computer architectures and accelerators. It will also involve collaboration with leading
-
our BSc. and MSc. program by contributing with teaching and supervision? Then the Department of Civil and Architectural Engineering invites you to apply for a 4-year postdoc position on position “data
-
libraries for modern architectures (e.g., GPUs). Exploration of linear algebra methods in computational physics applications and machine learning. Integrate and benchmark the GINGKO library, a sparse solver
-
Fixed-term: The funds for this post are available for 12 months. Applications are invited for a Research Assistant (RA) to join the Prorok Lab in the Department of Computer Science and Technology
-
and engineering staff on computing architecture, including networking, data pipeline design and storage; data analysis and data collection software; and machine learning research Collaborate with other
-
, ThingsBoard, etc. Familiarity with Edge Computing architecture to process data locally before transferring it to the cloud. Implementation of pipelines to collect real-time data from IoT sensors. Expertise in
-
post-doctoral researcher position. Led by Prof. Nektarios Tsoutsos, the Trustworthy Computing Group specializes in the broader areas of cybersecurity, applied cryptography, computer architecture