Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
with real-world applications, in collaboration with Volvo Cars and Volvo Group. This is an ideal position for candidates interested in interpretable AI, safety guarantees, and high-impact research in
-
of science and technology Most employees in the cybersecurity field are currently male, which is why we are happy to see female applicants. Further information Employment as a PhD student is limited to 4 years
-
the intersection of control theory, robotics, artificial intelligence, and signal processing, and is a key enabler of future intelligent infrastructure.This project will focus on the development of novel control
-
isyphdcouncil@groups.liu.se . Starting date by agreement. Background screening may come to be carried out before any decision on employment is made. Salary and employment benefits The salary of PhD students is
-
patterns in human health. The research is also related to global food security topics in an international context. About the research project Both microalgae and macroalgae (i.e. seaweed) have emerged as
-
employment benefits The salary of PhD students is determined according to a locally negotiated salary progression. More information about employment benefits at Linköping University is available here. Union
-
PhD Position in Theoretical Machine Learning – Understanding Transformers through Information Theory
professors and a dynamic team of PhD students and postdocs working in areas such as wireless and optical communication, information security, information theory, and machine learning. At the department, we
-
Are you passionate about railways, acoustics, and data-driven infrastructure solutions? We are looking for a PhD student to join the project “A robust tool for rail fault and roughness estimation
-
-disciplinary research, undergraduate and postgraduate education within Medical Science. The employment In connection with your admission to the doctoral program, your employment as a PhD student is handled. More
-
risk analysis. -Testing for security and security countermeasures analysis and implementation -Access and usage control for secure data sharing in industrial eco-systems. -Virtualization at the cloud