18 parallel-computing-numerical-methods-"Prof" positions at Queen's University Belfast
Sort by
Refine Your Search
-
. You will apply your specialist knowledge and experience of engineering design/analysis in the development of new methods and processes, automation of elements of the concept design and detailed design
-
The 35m EUR Co-Centre for Sustainable Food Systems encompasses a research programme of oriented basic and applied research in the areas of science, technology, engineering and social sciences across
-
The Centre for Secure Information Technology (CSIT), in the School of Electronics, Electrical Engineering and Computer Science (EEECS) at Queen’s University Belfast, seeks to appoint a Research
-
approaches—GAMs, Random Forest, boosted models, and multivariate methods—to quantify habitat associations, map species–environment relationships, and identify high-priority conservation areas, including
-
Communities) project, through the delivery of research activities specifically on coastal community resilience, sustainability and marine governance using arts based and social science research methods. A key
-
management in relation to leases, licences, legal title issues, landlord and tenant matters, rent reviews, rates valuations and management. Highly numerate with well developed skills in relation to statistical
-
of applying tooling design knowledge to develop or improve moulds, tooling systems or manufacturing methods, with measurable impact. Demonstrable evidence of working on a range of composite and polymer
-
, delivery and lead time. Evidence of applying process knowledge to develop or improve components, manufacturing methods or technologies, with measurable impact. Experience of using software packages to assist
-
28 Nov 2025 Job Information Organisation/Company Queen's University Belfast Department Centre for Secure Information Technologies Research Field Computer science » Cybernetics Engineering » Computer
-
vulnerabilities. This role sits at the intersection of AI for security, AI security, and computer architecture, contributing to a first- of-its-kind security framework for next-generation Hw/Sw computing systems