Sort by
Refine Your Search
-
Applications should include: Curriculum Vitae (including work experience, list of publications) Cover letter indicating the research area of interest and your motivation Research statement Early application is highly encouraged, as the applications will be processed upon reception. Please apply...
-
optimizing PIC algorithms for modern heterogeneous architectures, including CPUs, GPUs, and other accelerators, the project seeks to achieve unprecedented efficiency and resolution in plasma simulations
-
optimizing PIC algorithms for modern heterogeneous architectures, including CPUs, GPUs, and other accelerators, the project seeks to achieve unprecedented efficiency and resolution in plasma simulations
-
Provide guidance to PhD students Disseminate results through scientific publications Prepare research proposals to attract industry partnerships as well as national and European grant projects Manage
-
Applications should include: A cover letter A copy of the PhD diploma or a letter indicating the expected defense date A detailed curriculum vitae with a complete bibliography of published works
-
Applications should include: Curriculum Vitae Cover letter A copy of the PhD diploma or a letter indicating the expected defense date Copy of a publication The name, current position and
-
PhD thesis. If you choose a publication with multiple authors, please also explain your own contribution Early application is highly encouraged, as the applications will be processed upon reception
-
to contribute to the design and collection of future YSL waves and disseminate findings to relevant audiences. The successful candidate will join the YSL research team (two PhD students, one postdoctoral
-
will be developing control electronics based on Arduino or Raspberry Pi and write the corresponding software, ensuring significant automation and simple user interfaces such that other researchers can
-
Qualification: PhD in Computer Science Experience in dependable systems, real-time and embedded systems and/or operating systems and the threats and attacks they are exposed to is highly valuable