29 formal-verification-computer-science Postdoctoral positions at University of Luxembourg
Sort by
Refine Your Search
-
profile PhD in Mathematics, Theoretical Computer Science, Information Theory, Physics or related fields High level of mathematical maturity Experience with topics related to quantum LDPC codes and decoding
-
application is highly encouraged, as the applications will be processed upon reception. Please apply ONLINE formally through the HR system. Applications by Email will not be considered. The University
-
of possible research interests/ideas Early application is highly encouraged, as the applications will be processed upon reception. Please apply ONLINE formally through the HR system. To ensure full
-
will be processed upon reception. To ensure full consideration, candidates should apply by 15 August 2025ONLINE formally through the HR system. Applications by Email will not be considered. All qualified
-
full consideration, candidates should apply by 12 July 2025 ONLINE formally through the HR system. Applications by Email will not be considered. All qualified individuals are encouraged to apply. In line
-
. Please apply ONLINE formally through the HR system. Applications by Email will not be considered. The University of Luxembourg is committed to achieving gender parity among its staff. Should candidates
-
. To ensure full consideration, candidates should apply by 30/06/2025 ONLINE formally through the HR system. Applications by Email will not be considered. All qualified individuals are encouraged to apply. In
-
/06/2025 ONLINE formally through the HR system. Applications by Email will not be considered. All qualified individuals are encouraged to apply. In line with our values, the University of Luxembourg
-
interest and your motivation Early application is highly encouraged, as the applications will be processed upon reception. To ensure full consideration please apply by May 15th, 2025 ONLINE formally through
-
Qualification: PhD in Computer Science Experience in dependable systems, real-time and embedded systems and/or operating systems and the threats and attacks they are exposed to is highly valuable