Sort by
Refine Your Search
-
of Computer Science has the following research groups: Automated System Verification and Validation ; Data Engineering, Science, and Systems ; Distributed Sustainable Software and Systems ; Formal Methods for Security
-
Verification and Validation ; Data Engineering, Science, and Systems ; Distributed Sustainable Software and Systems ; Formal Methods for Security and Privacy ; Foundations for Interacting and Computing Systems
-
of Computer Science has the following research groups: Automated System Verification and Validation ; Data Engineering, Science, and Systems ; Distributed Sustainable Software and Systems ; Formal Methods for Security
-
Engineering Cybersecurity Distributed and Cloud Computing Operating Systems and Digital Infrastructure AI for Software Engineering Software Engineering for Internet of Things Software Engineering for Cyber
-
infrastructure and by providing support and expertise to researchers. The key areas of the center are High Performance Computing (HPC), Cloud Services, Data Analytics and Data Management Services. We assist a
-
methods (logic, theorem provers, type systems, categories, etc.), concurrent programming languages (choreographic programming, session types, etc.), distributed computing (cloud computing, microservices
-
The Department of Computer Science at The Technical Faculty of IT and Design invites applications for PhD stipends on one of the topics of Digital Twins and Hierarchical Multi-Agent Safe
-
of developmental neurobiology, circuit neuroscience, and computational biology. The centre constitutes a merger of the EMBL-node DANDRITE with a new research programme in neuronal circuits and circuit dysfunctions
-
programming, including embedded systems, programming of critical software and infrastructure, high-performance computing, and distributed systems. Model-driven Software Engineering Cybersecurity, including
-
.), distributed computing (cloud computing, microservices, etc.), Dev(Sec)Ops, software engineering (software product lines), human factors in security and privacy, post-quantum and embedded cryptography, and