Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. This position requires developing bioinformatics pipelines, applying variant interpretation algorithms, project management skills and communicating with diverse stakeholders to gather and articulate requirements
-
laboratories and testbeds for optical communications in Europe and maintains a complete library of optical communications digital signal processing algorithms. We are recruiting students in the field of digital
-
mobile robotics, you will manage own academic research and administrative activities, adapt existing and develop new methodologies in robotics, design working algorithms from theories, deploy and test
-
. Candidates having relevant research or working experience in LLM/VLM and AI decision-making algorithms for autonomous vehicles will be preferred. Good communications skills and the ability to work
-
strategies, and cross-functional collaboration — shaping the future of quantum computing. We holistically address business-relevant challenges using innovative quantum computing algorithms and demonstrate
-
, and language modeling. Students will acquire hands-on experience by implementing models such as clustering algorithms, automatic text categorization, and experimental evaluation. As an introduction
-
developing machine learning algorithms specifically designed for medical imaging applications. In addition, performs analysis of tissue images of cancer using machine learning methods that have been prototyped
-
natural language processing to algorithmically detect hate speech across a variety of online venues (newspaper and social media). To do so, we need an up-to-date, high-quality corpus of training data. Job
-
theoretical mathematical foundations and practical implementation of circuits and computer algorithms. The course presents applications in engineering, physics, feedback and control, communications, and signal
-
research for digital security and is a pioneer in developing highly innovative concepts, algorithms and systems for anomaly detection, cyber threat intelligence, penetration testing and cryptography. Through