Sort by
Refine Your Search
-
of IETR's technological platforms: 1) nR (NanoRennes) platform, https://www.ietr.fr/en/nr-nanorennes-platform with experience in microfabrication. 2) M²ARS (Manufacturing Measurement Analysis of Radiating
-
functional interactions. This part of the work requires knowledge in and interest for algorithms for high throughput sequence analysis, in data structures for sequence data, and in processing of deep
-
, and accuracy [13]. * Trade-offs Between Efficiency and Performance - Quantitative Analysis: Measure the energy consumption of AI workloads across different deployment scenarios (edge, network, cloud
-
analysis, histology, and data analysis, as well as animal facilities for aquatic and terrestrial species. Paris-Saclay University is located 25 km South-West of Paris and is the highest-ranked university in
-
aerobic and anaerobic conditions. The main activities are: - Perform environmental metagenomics analysis from laboratory and field bioremediation experiments. - Determine relevant functional and taxonomic
-
to perform state-of-the-art lattice QCD simulations and carry out the associated data analysis required to extract parton distributions, including both parton distribution functions (PDFs) and
-
domestic wildlife, and the inhabitants of the Jura Mountains 2) Spatial and temporal analysis of hunting pressure and lynx presence within the study area 3) Population dynamics of chamois and roe deer in a
-
analysis, with access to high-performance computing facilities. The candidate will interact with researchers working on nanofluidics, interfacial phenomena, and transport processes, and may collaborate with
-
departments, IRISA is a center of excellence whose scientific priorities include bioinformatics, system security, new software architectures, virtual reality, big data analysis, and artificial intelligence
-
of this postdoctoral position is to enable the formal verification of security protocols involving non-negligible probabilities. Formal methods have proven their value in the design and analysis of security protocols