12 postdoc-distributed-algorithms PhD scholarships at University of Twente in Netherlands
Sort by
Refine Your Search
-
, numerical analysis, and implementation of novel numerical algorithms to efficiently solve parabolic PDEs such as the heat equation. More precisely, you shall investigate space-time finite element methods (FEM
-
a focus. Traditionally, this is done through iterative algorithms (‘trial and error’). In this project, we aim to develop a radically different approach where the correct shape is computed using a 3-D
-
professor Associate professor Education EngD Finance HRM IT Lecturer Legal staff Management Marketing and communications PhD Policy and staff PostDoc Professor Research, development, innovation Researcher
-
the fields of Semantic Technologies and Artificial Intelligence, resulting in a PhD thesis. Collaborate with other PhD candidates, postdocs, and societal partners across the consortium. Participate in DECIDE
-
the fields of Semantic Technologies and Artificial Intelligence, resulting in a PhD thesis. Collaborate with other PhD candidates, postdocs, and societal partners across the consortium. Participate in DECIDE
-
Marketing and communications PhD Policy and staff PostDoc Professor Research, development, innovation Researcher Technical and laboratory You are signed up for the Job alert Previous Next Sign up Cookies We
-
PhD Policy and staff PostDoc Professor Research, development, innovation Researcher Technical and laboratory You are signed up for the Job alert Previous Next Sign up Cookies We use cookies and similar
-
expected to closely collaborate with at least 2 other PhD students and one postdoc within the project. While this PhD project will focus on sustainable membrane production, others will focus on advanced
-
graph learning models, primarily geared towards assisting combinatorial solvers for practical graph algorithm benchmarks. Please find out more here: Dr. G. Rattan Information and application Are you
-
for image classification and other domains against existing open source LLM (e.g., Llama 3, Phi-3), as well as develop new kinds of attacks, for example based on evolutionary algorithms. 2. Investigate