Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
live in. Your role The PhD position is embedded within the MICRO-PATH Doctoral Training Programme, funded by the Luxembourg National Research Fund. MICRO-PATH, or Pathogenesis in the Age of
-
the EU Research Framework Programme? Not funded by a EU programme Reference Number BAP-2025-526 Is the Job related to staff position within a Research Infrastructure? No Offer Description We invite
-
possible. The successful PhD applicant will have to register at, and comply with, the regulations of KU Leuven’s Arenberg Doctoral School before final acceptance. The student will follow a doctoral programme
-
to international training and networking opportunities through the MAGNIFY Doctoral Network. The goal is to obtain a PhD degree from KU Leuven after successful completion of the program. For more information please
-
-year PhD program. Your initial appointment will be for 2 years that will be extended for 2 additional years, provided satisfactory progression in the PhD program. Your salary is set by university
-
variable, even within the same family, making it difficult to predict the course of disease, provide accurate genetic counselling, or design effective therapies. This PhD project aims to better understand
-
are searching for a motivated PhD candidate to design practical over-the-air computing algorithms and protocols for future edge AI applications. About the employer The research of this PhD position will be
-
months (extendable up to max. 48 months, on condition of the positive evaluation of the PhD activities), with planned starting date 01/12/2025. You’ll receive a grant linked to one of the scales set by
-
related to staff position within a Research Infrastructure? No Offer Description 1. INFORMATION ABOUT THE POSITION Position: PhD student Number of vacancies: 1 Project: Horizon Europe Framework Programme
-
Networks, and ICT Services & Applications. Your role Design intelligent agent architectures leveraging large language models (LLMs), planning algorithms, and secure transaction protocols tailored