Sort by
Refine Your Search
-
Category
-
Employer
-
Field
-
the mobility, ubiquity, security, and interactivity of computers, data, software, and users. The pervasive computing paradigm enables technologies such as sensors, actuators, and computers to take a back seat
-
and estimation Multi-agent planning and cooperation Communication-aware coordination strategies Learning-based control in networked systems Resilience and safety in multi-agent systems
-
which is part of the Swedish Radiation Safety Authority’s expert support organization. The research group is located in Malmö. Here you can read more about our research . Description of the project A
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values. For information about processing of personal data in the recruitment process. It may be the case that a position at KTH is classified as a security-sensitive role in accordance with the Protective
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
, procedure codes, etc.). Present results verbally and in writing, nationally and internationally. Participate in scientific meetings and publication work. Work securely with sensitive data. Eligibility