Sort by
Refine Your Search
-
the theory of quantum graph states. Additional expertise in computational methods would be useful but is not necessary. The Postdoctoral and Senior Research Associate positions will also involve
-
Ramsey Theory and Graph Packing. Another example of the interplay between algorithms and combinatorics arises in the context of graph packing. See the following paper: https://epubs.siam.org/doi/abs
-
invites applications to Doctoral Researcher positions in Computational Physics The positions are hosted in the Surfaces and Interfaces at the Nanoscale(SIN) group at Aalto, led by Prof. Adam Foster. We
-
Applications are invited for a Research Fellow position on the UKRI-funded Turing AI Fellowship project ‘Event-Centric Framework for Natural Language Understanding’ led by Prof. Yulan He. The 5-year project aims
-
About us The Department of Informatics is seeking to appoint a postdoctoral research fellow with an excellent track record in knowledge graphs, semantic technologies, and machine learning. Topics
-
analysis, and graph theory. The novel concept of limits for extended graphons captures the network’s connectivity structure, which plays a crucial role in collective dynamics. Although this area has seen
-
processing, signal processing, and network resource management to enhance performance. To optimize and analyze complex 6G networks, we use AI/ML, graph theory, and optimization techniques Furthermore, our
-
Theory, Queuing Theory, Age of Information), Network Calculus, Graph Theory, Convex and Non-convex Optimization, Approximation Algorithms. An excellent Master’s degree in Computer Science, Engineering
-
For the department "Skill Formation and Labor Markets" (Head: Prof. Dr. Heike Solga) the WZB is looking for a student assistant (ID 336) as of October 1, 2025, for an initial period of one year with
-
methods such as graph theory and networked systems, with the latest AI-enable data fusion and digital co-simulation technologies for a more resilient cyber-physical power systems, so that cyber can have a