Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
, prior interactions, rank differences, and kin relationships). We will explore the implied cognitive complexity of great ape communication to identify evolutionary trends and simulate dynamics that might
-
-world energy applications, the project aims to better capture the dynamics of urban infrastructures across different spatial and temporal scales, from building-level energy demand to district-scale
-
(mathematical modeling in ecology, LOMIC, Banyuls-sur-Mer) and Prof. Christoph Grunau (Host-Pathogen-Environment Interactions, IHPE, Perpignan). Both laboratories are equipped with all the necessary computational
-
oriented towards the development of a domain-specific design automation framework for cryptographic hardware. Your work will focus on identifying the mathematical knowledge and properties to guide hardware
-
mathematical methods, algorithms, and applications are required. Simulators are a recognized method for architectural design explorations and the implementation of software development platforms. The goal
-
work will focus on identifying the mathematical knowledge and properties to guide hardware optimizations tailored to different environments. The optimizations range from algebraic optimizations (e.g
-
. Your work will focus on identifying the mathematical knowledge and properties to guide hardware optimizations tailored to different environments. The optimizations range from algebraic optimizations (e.g
-
3 Oct 2025 Job Information Organisation/Company Universidad de Alicante Department Department of Mathematics Research Field Mathematics » Algorithms Researcher Profile First Stage Researcher (R1
-
, extinctions, and environmental change; ● Running simulations and scenario analyses to explore how different discounting rules or time preferences shift optimal conservation choices; ● Fitting models
-
, quantum networks are slowly becoming a reality. The coordination algorithms that govern their operation are unlike those employed in classical networks, necessitating novel verification approaches. The goal