33 computational-physics PhD positions at Chalmers University of Technology in Sweden
Sort by
Refine Your Search
-
tools and urban mining developments, you will be supported by co-supervisor Alexander Hollberg, Associate Professor in Computational Sustainable Design, and leader of the research area Sustainable Built
-
: M.Sc. degree (or equivalent) in Physics, Mathematics, Computer Science, or a related field, corresponding to at least 240 higher education credits. Proficiency in conducting literature reviews. Expertise
-
: The successful candidate must have a Master's degree in electrical engineering, engineering physics, or related disciplines. Completed courses in signal processing, radar or communication theory are meritorious
-
) Country Sweden Application Deadline 31 Mar 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme
-
) Country Sweden Application Deadline 10 Apr 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme
-
hours. The doctoral program is designed to lead to a PhD within four years of full-time study. However, with teaching duties included, the position is expected to span five years. Read more about doctoral
-
Application Deadline 30 Mar 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Reference Number 304--1
-
Application Deadline 30 Apr 2025 - 22:00 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Reference Number 304--1
-
key encryption, can I also always have signature schemes?" and proves whether such statements are true or false. Information about the division and the department The Department of Computer Science and
-
services running on top of optical network infrastructure vulnerable to physical-layer attacks. By developing a new, bottom-up approach to network security and incorporating a physical-layer perspective into