Sort by
Refine Your Search
-
interface. - Deployment, compilation, and execution of the ECCO-Darwin model on the supercomputer - Numerical developments on the ECCO-Darwin model code - Analysis of numerical model outputs - Processing and
-
Language Processing, can be used to extract linguistic knowledge, particularly concerning tones. The main object of investigation will be the Yongning Na language (ISO code: NRU). This work, based on fine-tuning models
-
the AliceVision library. Activity 3: Critical Code Optimization (C++/CUDA) - Adapt the code to drastically reduce computation times (target: < 1h). - Replace proprietary dependencies (InstantNGP) with a flexible
-
Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description With the increasing complexity of numerical simulation codes, new
-
modeling - Coalescent modeling - Coding - Tests with simulations - Data analyses - Paper writing - Presenting results -Integration within the BioDiv team at IBENS - Availability of work station, computer
-
; apply the developed methodology to complex heterostructures The postdoctoral researcher will be recruited within the Chemical Theory and Modelling team (http://www.quanthic.org ) of the Institute
-
(M/F) will work within the LUPM. The research fellow (M/F) recruited will be eligible for training and support when taking up their duties. Where to apply Website https://emploi.cnrs.fr/Candidat/Offre
-
the AliceVision library. Activity 3: Critical Code Optimization (C++/CUDA) - Adapt the code to drastically reduce computation times (target: < 1h). - Replace proprietary dependencies (InstantNGP) with a flexible
-
existing hydrodynamic code to simulate experiments from the literature, implement and improve multi-phase behaviour laws to optimise their predictive capabilities, and carry out new laser shock experiments
-
of wiretap coding in highly directive links and to obtain new bounds for the finite-blocklength secrecy rate under a mutual information secrecy constraint. Context : Physical layer security techniques