Sort by
Refine Your Search
-
track record on one of the following research areas: Trustworthy AI AI for formal methods Formal methods for AI The successful candidate will participate in the activities of the research group led by
-
• Supervision of interns, collaboration with PhD students The team investigates logical foundations and formal methods for quantum programming languages leveraging on a strong expertise in linear logic, lambda
-
engineering; Formal methods, models, and languages; Interactive and cognitive systems; Distributed systems, parallel computing, and networks. The successful candidate will work closely with teams specializing
-
, etc.). Robust AI (knowledge of methods for quantifying uncertainty in deep learning or formal verification methods applied to deep learning) Embedded AI Reinforcement learning, supervised and
-
fellow will carry out the development of theoretical and methodological formalisms in relativistic quantum chemistry, as well as their implementation (Python). The position is within the BRUNCH project
-
about the financialization of capitalism, it often neglects the extremely profitable informal, illegal, and illicit financial markets, which are increasingly connected to formal global finance
-
nanoparticles, whose manufacture is generally based on “trial & error” methods. Thus, the aim of TOSCaNA is to develop an experimental approach and a CFD formalism for predicting the size and morphology of metal
-
Inria, the French national research institute for the digital sciences | Montbonnot Saint Martin, Rhone Alpes | France | 2 months ago
Website https://jobs.inria.fr/public/classic/en/offres/2025-09541 Requirements Skills/Qualifications Eligible candidates should have a PhD in computer science. Experience in formal methods or in
-
, contact or collision sensors, proprioceptive arrays) on mobile platforms (wheeled/rolling and/or aerial). Designing and integrating a soft shell for protecting the robot from collisions. Developing methods
-
-oriented features, present a large attack surface that traditional verification techniques—such as formal methods—struggle to cover. To effectively mitigate this growing threat landscape, vulnerability