Sort by
Refine Your Search
-
Category
-
Employer
-
Field
-
13 Mar 2025 Job Information Organisation/Company Ecole Centrale de Lyon Research Field Engineering Information science Researcher Profile First Stage Researcher (R1) Positions PhD Positions Country
-
Inria, the French national research institute for the digital sciences | France | about 2 months ago
person will be in connection with Alain Tchana, Renaud Lachaize and Jean-Pierre Lozi, the supervisors of this PhD. Responsibilities : The person recruited is responsible for prototyping and evaluating xOS
-
). The PhD student will have the opportunity to spend 15 to 30 days at UTSA during his or her PhD. The doctoral student position at LIMA is in an area covered by a restricted zone, and therefore requires, in
-
6 Mar 2025 Job Information Organisation/Company Ecoles Pratique des Hautes Etudes - PSL Research Field Anthropology Religious sciences Researcher Profile First Stage Researcher (R1) Positions PhD
-
-based devices such as magnetic memories or spin valves for information storage. In this PhD work, we aim to develop novel chiral hybrid systems based on helical molecules bearing organometallic and
-
monitor its state while in use. It has been of increasing interest for the last decades due to numerous advantages in terms of security, cost, and environmental impacts. Optical fiber sensors are very
-
20 Feb 2025 Job Information Organisation/Company IMT Atlantique Research Field Communication sciences Computer science Researcher Profile First Stage Researcher (R1) Positions PhD Positions Country
-
Additional comments This thesis subject is funded by the Nuclear Safety and Radiation Protection Authority, as part of the European FIND project. Website for additional job details https://emploi.cnrs.fr
-
21 Feb 2025 Job Information Organisation/Company IMT Atlantique Research Field Communication sciences Computer science Researcher Profile First Stage Researcher (R1) Positions PhD Positions Country
-
, environment, manufacturing and the industry of the future, as well as defense. For many years, security research on vulnerabilities, attacks, and corresponding countermeasures has been conducted on computing