Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
facilities to conduct world-leading fundamental and applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department plays an active role in
-
programming, session types, etc.), distributed computing (cloud computing, microservices, etc.), Dev(Sec)Ops, software engineering (software product lines), human factors in security and privacy, post-quantum
-
www.kt.dtu.dk/research/dpc and https://www.kt.dtu.dk/ . If you are applying from abroad, you may find useful information on working in Denmark and at DTU at DTU – Moving to Denmark . Application procedure Your
-
Associate Professor Arijit Khan, Department of Computer Science. His research works can be found at , https://scholar.google.com/citations?user=6Y-m8k4AAAAJ&hl=en , and at https://dblp.org/pid/67/2933.html
-
. In terms of research The position includes research within the project Best for Us (in Danish, Bedst for Os) https://bedstforos.dk/ . Best for Us is a large research project aimed at investigating
-
research works can be found at , https://scholar.google.com/citations?user=6Y-m8k4AAAAJ&hl=en , and at https://dblp.org/pid/67/2933.html . Within the area, the position comes with many freedoms in terms
-
(co-PI Buchhave, https://arielmission.space ). Additional information about the Exoplanet Group at DTU Space can be found at http://www.exoplanets.dk . Responsibilities and qualifications We are seeking
-
. Additional information about the Exoplanet Group at DTU Space can be found at http://www.exoplanets.dk , and more details about 2ES can be found at http://www.2es.dk . Responsibilities and qualifications We
-
work on development of wave energy and offshore wind. Most of our research is focused around work in our wave flume and basin. Further description of the group may be found here: https://vbn.aau.dk/en
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open