Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
issues related to fairness and safety in human-robot interaction applications. An AI trustworthiness model will be developed and validated ensuring that both data and models of human interaction
-
. Tests may be applied in this recruiting process. For information about processing of personal data in the recruitment process. It may be the case that a position at KTH is classified as a security
-
and application architectures with implementations of massively distributed embedded systems that interact with each other and their environment to enable secure, goal-driven, autonomous and evolvable
-
in leading journals, secure funding and develop teaching skills What we offer 4-year full funding for a PhD student is included in both positions Leadership training, mentoring, and relocation support
-
, and analysis. Mentoring MSc, PhD students, and postdoctoral researchers in toxicology and related methods. Maintaining and managing laboratory equipment, and ensuring compliance with chemical and
-
associated with the position, in accordance with Lund University's Appointment Rules . To be eligible for the appointment as associate senior lecturer, the candidate must hold a PhD or equivalent foreign
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
Uppsala University, we are announcing the position as DDLS PhD student in Data driven epidemiology and biology of infection. Data driven epidemiology and biology of infection covers research that will
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
software security. The position is funded by the Wallenberg Autonomous Systems and Software Programme (WASP), and participates in the WASP NEST project `ShiftLeft: Securing the Software Supply Chain by Code