Sort by
Refine Your Search
-
Listed
-
Country
-
Program
-
Employer
-
Field
-
reconstruction algorithms. Inconsistencies can be used to correct the input data, for example to improve attenuation correction. The aim of this postdoc is to correct rigid motion in SPECT reconstruction based
-
trustworthy medical AI? Deep models already outperform humans on many benchmarks, yet in the clinic they remain black boxes: radiologists cannot see why an algorithm flags a lesion, and AI engineers cannot tell
-
You will join the EPSRC-funded project “Behavioural Data-Driven Coalitional Control for Buildings”, pioneering distributed, data-driven control methods enabling groups of buildings to form
-
for complex scientific problems Designing algorithms to improve the performance of scientific applications Researching digital and post-digital computer architectures for science Developing and advancing
-
-efficient computing Developing mathematical modeling for complex scientific problems Designing algorithms to improve the performance of scientific applications Researching digital and post-digital computer
-
02.07.2025, Wissenschaftliches Personal The Professorship of Energy Management Technologies at TUM’s School of Engineering and Design is looking for a Postdoc (f/m/d) in Energy Informatics. You are
-
, encryption/decryption and compression; use of microelectronics devices (including COTS); implementation, inference, verification and validation of algorithms** on processing hardware platforms for space
-
image analysis pipelines, algorithms, and quantitative methods. Job Description Primary Duties & Responsibilities: Information on being a postdoc at WashU in St. Louis can be found at https
-
to engage in pioneering research, collaborate with a large, dynamic and multidisciplinary team, and advance the field of quantum computing through innovative algorithms and technologies. This is an exciting
-
missions. 6) Crypto key management and adaptation of post-quantum cryptography (PQC) Developing robust key management protocols to ensure secure generation, distribution, and storage of cryptographic keys in