261 data-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"I.E" positions at University of Sheffield
Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
gas emissions. These will be developed in collaboration with domain experts, Multus-tech, Valcourt and Rothamsted. The latter will provide access to their data. 4. Integrate counterfactual reasoning
-
engagement and involvement co-production methods (such as the development of accessible information and research methods, working in collaboration with partners, seeking their advice and acting on it and
-
is on mathematics and computation. At the heart of the project are value-based decision problems. Here, an agent receives noisy information about the value of several possible options. The agent must
-
Essential Interview / Application Further Information Grade 4 Salary £25,249 - £26,707 per annum with the potential to progress to £28,778 Work arrangement Full-time (35 hours per week) Duration Permanent
-
, breakthroughs increasingly depend on the ability to process vast amounts of information quickly and efficiently. But as our appetite for computing power grows, so does its cost both in terms of money and
-
in Tanzania and Zambia. We will generate whole-genome data for thousands of individuals to estimate the frequency spectra of transferred genes, with the aim of inferring the distribution of fitness
-
). This often means missed opportunities for earlier, more efficient intervention. The goal of this PhD is to change that by developing a data-driven framework that helps predict, prioritise, and prevent
-
such as sports or rehabilitation exercises, our movements carry a wealth of information about health, intention, and interaction with the world around us. Being able to capture and interpret
-
of five automobiles. Furthermore, while many smart devices (e.g. Alexa, Siri) connect over the internet to powerful data centers, this is not possible for “edge computing” devices, like smart sensor
-
use small security devices—such as bank authentication tokens, car key fobs, or hardware keys like YubiKeys—to prove who they are and keep their data safe. These devices, called hardware tokens, store