Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
optical computing devices that can solve hard combinatorial problems. Such combinatorial problems are commonplace in our society, for instance in logistics, finance or pharmaceutical research. However, for
-
the acquisition of a doctoral degree. The research programme of these individual researchers will be integrated into a set of 8 work packages that include the participation of 16 highly-reputed European academic
-
Participation in a large European collaboration State-of-the-art research facilities A dedicated training program to broaden your expertise and enhance your skill set A doctoral scholarship for a period of one
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
Directed Energy Deposition (DED) process for metallic components. The PhD candidate will focus on edge computing and the application of AI for data analysis and for identifying correlations with ground truth
-
computing needs, and enabling rapid responses to potential issues in remote locations. The aim is to develop robust and scalable software solutions suitable for practical industrial deployment on a large
-
) PhD degree at Ghent University) can apply. Exchange students cannot apply for this scholarship; This program is meant for students at the beginning of their PhD. To a limited extent, PhD students
-
collaboration with the candidate, a detailed research plan will be drafted aiming to unravel mutational robustness and evolvability in Escherichia coli. The work will involve genome editing (CRISPR), genetics
-
The Faculty of Engineering, Department Elektronica en informatica, Research Group Electronics and Informatics: Research – Development - Innovation is looking for a PhD-student with a doctoral grant
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular