Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
. We expect applicants to hold a PhD in a relevant field such as techno-anthropology, science and technology studies, human-computer interaction, human-robot interaction, digital health, anthropology
-
areas: cyber security privacy engineering cryptography and applied cryptography computer engineering edge or cloud computing and networking. You will be part of one of the department’s research groups in
-
Job Description We at the Hearing Systems Section are offering a postdoctoral research position in auditory science, motion behaviour, data analysis, and/or human communication. You will contribute
-
academic approval, and the candidate will be enrolled in one of the general degree programmes at DTU. For information about our enrolment requirements and the general planning of the PhD study programme
-
professional experience At least 5 years of hands-on experience as an entrepreneur or in building and operating digital products and technology startups, ideally within fintech, SaaS, data platforms, or AI
-
plant operation. The job We are looking for an academic employee, who has an interest in and very much like experience with laboratory work, including data collection and analysis, literature research
-
The scholarship for the PhD degree is subject to academic approval, and the candidate will be enrolled in one of the general degree programmes at DTU. For information about our enrolment requirements and the
-
, journalism, political science, sociology, law, economics, or computational social science, as well as an interest in how AI transforms the media and information ecosystem. The PhD student(s) will be embedded
-
of Humanities and conducts research within a wide range of areas, including Design Studies, Media Studies, Education Sciences, Philosophy, Information Studies, Library Science, Organizational Communication, and
-
. The work will explore adaptive MAC designs that leverage waveform structure and context information to improve user management, access efficiency, and robustness. A key aspect of the research is the joint