Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
and BSc students as well as research assistants Qualifications: PhD in biotechnology, biochemistry, biology, chemistry, biophysics, or related area Experience with molecular biology and protein
-
and BSc students as well as research assistants Qualifications: PhD in biotechnology, biochemistry, biology, chemistry, biophysics, or related area Experience with molecular biology and protein
-
that you will obtain the PhD degree no later than 4 months after starting the Post Doc. You must have experience with quali-quantitative methods, tuning of LLM and computational data analysis and
-
-efficient magnetic heating/cooling device. Qualified applicants must have: PhD degree in physics, astronomy, engineering, computer science or similar. Experience with finite element modeling, ideally Comsol
-
PhD degree in Computer Science, Electrical Engineering or equivalent. Research interests and a scientific track record in Edge Computing research fields, such as Embedded AI, Edge AI, TinyML, and AIoT
-
for its high academic quality and societal impact. The Department of Electronic Systems employs more than 200 people, of which about 90 are PhD students, and about 40 % of all employees are internationals
-
of relevance through publications and collaborations Co-supervision of bachelor and master students within the above-mentioned fields Qualifications: PhD degree (or equivalent) in Computer Science, Artificial
-
, experimental and computational methods to study the physiology of microbes. You will work in a team contributing to projects of other team members, while independently developing your own project. You will also
-
high academic quality and societal impact. The Department of Electronic Systems employs more than 200 people, of which about 90 are PhD students, and about 40 % of all employees are internationals. In
-
device-to-architecture level models of emerging nanoscale devices (spintronic, resistive, or hybrid) for in-memory and neuromorphic computing. Exploring hardware-level security mechanisms based