Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
theory, mathematical physics, quantum algorithms, quantum software architecture and quantum computing. We offer Our new colleagues will become part of an inspirational international research environment
-
software architecture and signal processing. You will work closely with our international team of collaborators to ensure the system meets the rigorous requirements for clinical skin sample analysis. Your
-
Job Description The Department of Mathematics and Computer Science at the University of Southern Denmark, Vejle, invites applicantions for PhD positions with a focus on Software Architectures and
-
Job Description A 2-year Postdoc in Internet of Underwater Things (IoUT) is available in the Embedded Systems Engineering (ESE) research section at DTU Compute , where you can help build up and
-
Job Description Are you passionate about neuromorphic computing and hardware design? Do you want to contribute to the next generation of brain-inspired computing systems for healthcare applications
-
. policies, protocols and mechanisms for (biometric) authentication and access control Network Security Technologies, Architectures and Protocols Computer and Network Forensics Reverse Engineering and Malware
-
to join a cutting-edge research project at the intersection of microelectronics and quantum computing. As the quantum computing field rapidly advances toward large-scale, fault-tolerant systems, one
-
platforms can unify production environments, enabling predictive maintenance and data-driven optimization through centralized data platform architectures. Your research will focus on addressing current
-
-waveguide couplings that surpass the time-bandwidth limit of static cavities [Xue2022]. With these components as building blocks, we envision large-scale recirculating circuit architectures [Heuck2023b
-
. policies, protocols and mechanisms for (biometric) authentication and access control Network Security Technologies, Architectures and Protocols Computer and Network Forensics Reverse Engineering and Malware