Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
, software design, distributed systems engineering and software engineering. You are involved in organizing meetings, conferences and symposia. These are your qualifications: Must-haves: You have completed a
-
neural networks under symmetry constraints, their optimization dynamics, and their generalization behavior—particularly in low-data or out-of-distribution settings. The work combines formal theoretical
-
increasingly complex compute- and data-intensive problems in science and engineering on high-end parallel and distributed computing platforms. More information: https://sc.cs.univie.ac.at/ Your future tasks
-
background ranging from mathematics and theoretical physics all the way to numerical simulation algorithms? Then apply now to join our team of theoretical researchers in the Quantum Information and Quantum
-
Innsbruck and help bring quantum computing to its full potential. The ideal candidate has achieved excellent research results in several of the following fields: Quantum algorithms Quantum complexity Quantum
-
, virtual assistants, or AI-driven systems such as chatbots, recommender algorithms, or generative AI. The position focuses on how communicative processes are shaped by and shape these technologies
-
outstanding candidates whose work lies at the intersection of statistics, machine learning, data analytics and modern AI algorithms. This includes, in particular, statistics for high-dimensional and complex
-
variety of key technologies like Distributed IT Systems, Internet of Things, IoT, Cybersecurity, Data Science, Artificial Intelligence (AI), Blockchain Technologies, Quantum & Photonic Technologies
-
working in the research group “Theory and Applications of Algorithms” at the Faculty of Computer Science. The position is limited to six months and is planned to be filled from 01.10.2025. Your future tasks
-
group “Foundations of Cryptography” within the research group “Theory and Applications of Algorithms” at the department of Computer Science focuses on provable security of cryptographic schemes. We