Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
. The appointment is for one year with the possibility of renewal based on performance and availability of sponsored research funding. Key Responsibilities Lead research projects in embedded systems security under
-
Job Description Are you looking to grow your career in intelligent embedded systems and edge computing? Join the Embedded Systems Engineering (ESE) research section at DTU Compute , where your
-
on the effective integration of renewable energy, resource efficiency, and waste reduction. The candidate must hold a PhD in Urban or Rural Development, Civil Engineering or related domain. The candidate is expected
-
Department: Psychology Vacancy ID: 039003 Closing Date: 06-Jan-2026 The Role Maynooth University is committed to a strategy in which the primary University goals of excellent research and
-
required PhD in one of the following fields: electronics and embedded systems, telecommunications, industrial computing, electrical engineering or equivalent. Expertise in the design, prototyping and
-
your PhD diploma. If you are in the final stage, then a letter from your PhD supervisor, stating the date of PhD defence, is also sufficient. Interviews will be held before the 30th of January 2026
-
The Role Maynooth University is committed to a strategy in which the primary University goals of excellent research and scholarship and outstanding education are interlinked and equally valued. We
-
the molecular structural dynamics and embedded chiral information in redox-active polycyclic aromatic hydrocarbons influence the emergence of novel photoluminescent properties. While the majority of objectives
-
(tokenization, embeddings) Familiarity with large-scale software and computing environments, including HPC workflows, is a plus Complete applications must include: Curriculum vitae A description of research
-
of renewal based on performance and availability of sponsored research funding. Key Responsibilities ● Lead research projects in embedded systems security under the supervision of the PI, including