631 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "U.S" uni jobs at University of Sheffield
Sort by
Refine Your Search
-
Listed
-
Field
-
is on mathematics and computation. At the heart of the project are value-based decision problems. Here, an agent receives noisy information about the value of several possible options. The agent must
-
. Assessment stage: Interview / Application Experience of running a workshop or similar technical facility. Assessment stage: Interview / Application Further Information Grade: 5 Salary: £27319 rising to £33951
-
appropriate information and advice to callers, often helping determine who at the University callers need to liaise with. Using the University’s Finance systems and following budget approval, create and convert
-
, breakthroughs increasingly depend on the ability to process vast amounts of information quickly and efficiently. But as our appetite for computing power grows, so does its cost both in terms of money and
-
). This often means missed opportunities for earlier, more efficient intervention. The goal of this PhD is to change that by developing a data-driven framework that helps predict, prioritise, and prevent
-
such as sports or rehabilitation exercises, our movements carry a wealth of information about health, intention, and interaction with the world around us. Being able to capture and interpret
-
in Tanzania and Zambia. We will generate whole-genome data for thousands of individuals to estimate the frequency spectra of transferred genes, with the aim of inferring the distribution of fitness
-
Essential Interview / Application Further Information Grade 4 Salary £25,249 - £26,707 per annum with the potential to progress to £28,778 Work arrangement Full-time (35 hours per week) Duration Permanent
-
of five automobiles. Furthermore, while many smart devices (e.g. Alexa, Siri) connect over the internet to powerful data centers, this is not possible for “edge computing” devices, like smart sensor
-
use small security devices—such as bank authentication tokens, car key fobs, or hardware keys like YubiKeys—to prove who they are and keep their data safe. These devices, called hardware tokens, store