Sort by
Refine Your Search
-
CMOS technologies. Well-versed in the end-to-end design flow, including circuit design, simulation, layout, PCB design, and measurement of integrated circuits using advanced CAD tools. Excellent
-
trustworthy and factual language models. Host of the largest basic research program in Sweden Wallenberg AI, Autonomous Systems and Software Program (WASP) as well as the Wallenberg AI and Transformative
-
flow, including circuit design, simulation, layout, PCB design, and measurement of integrated circuits using advanced CAD tools. Excellent communication skills and proficiency in both written and spoken
-
level in electrical engineering, electromagnetic engineering, wireless engineering, engineering physics, applied physics, a closely related field. Good command of electromagnetic simulation tools such as
-
to either first-principles calculations or AI supported database management of high-throughput type calculations/simulations. Basic knowledge of density functional theory (DFT) is beneficial. Strong
-
organizations in a rapidly changing world. The employment When taking up the post, you will be admitted to the program for doctoral studies. More information about the doctoral studies at each faculty is
-
applications towards materials science. Generative machine learning models have emerged as a prominent approach to AI, with impressive performance in many application domains, including materials discovery
-
/research/laboratory-of-organic-electronics/research . The employment When taking up the post, you will be admitted to the program for doctoral studies. More information about the doctoral studies at each
-
address outstanding questions on behavioural evolution in canids. Your work assignments Understanding how behaviours evolve is a long-standing goal in evolutionary biology. Using the domestic dog as a model
-
: Verifiable training and trustworthy AI pipelines. Tools for robust data and model provenance in adversarial environments. Methods for protecting training data and end users, including secure data removal and