Sort by
Refine Your Search
-
, understanding and predicting their thermal conductivity from first principles calculations is very challenging. In this doctoral research project, we plan to use machine learning potentials to investigate
-
switching in corresponding devices. In this project, we first plan to make optimized engineering of metal stacking involving light elements promoting the required orbital polarization and demonstrate
-
integrating artificial intelligence, from algorithm design to on-sky demonstration. The objective is to design intelligent adaptive optics systems capable of correcting sensor nonlinearities, anticipating
-
interactions by exploiting spatial transcriptomics data and network-theoretic approaches. Contract start date: May 1st 2026 or later depending on your availability Activities : - design of a new mathematical
-
improving energy efficiency and privacy [14]. - Resource-Aware Scheduling: Design algorithms to optimize task placement (edge vs. cloud) and scheduling policies for AI workloads, balancing latency, energy
-
of two CNRS researchers and a few Ph.D. students and master's students. The laboratory is fully equipped with various equipment (lasers, detectors, control systems) to fulfill the thesis plan. . The first
-
spectroscopy techniques and support the rational design of more efficient photocatalysts for sustainable chemical transformations. Where to apply Website https://emploi.cnrs.fr/Offres/Doctorant/UMR8181-HELTIS
-
the sample will be placed and ensure its connection to the incoming RF cables. Secondly, the outstanding selected candidate will have to design the RF on-chip circuit allowing the excitation of the spin
-
for Scientific Research (CNRS), two universities, and an engineering school from the Nord region. Its facilities for the design, fabrication, and characterization of micro- and nano-devices are among the best in
-
of this postdoctoral position is to enable the formal verification of security protocols involving non-negligible probabilities. Formal methods have proven their value in the design and analysis of security protocols