Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
perturbation prediction, including the design and implementation of novel training strategies under experimental constraints, e.g., active learning and other data-efficient approachesConduct large-scale
-
publications. For further information, please contact Prof. Dr. Anna Kornadt ( ) Your profile Ph.D. in psychology or a closely related discipline Strong interest in interdisciplinary research at the intersection
-
data encompassing various discrimination categories, with a focus on gender and ethnoracial groups, across multiple spheres of interactions, particularly hiring and rental housing. For more details see
-
different sensory modalities such as vision, audition, haptics Plan and conduct empirical user studies, including experimental design, data collection, and analysis of factors such as immersion, presence
-
, including contact information, academic record, research experience and publication list Cover letter detailing your motivation for applying to the advertised research topic and/or project, including how your
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
various disciplines: computer scientists, mathematicians, biologists, chemists, engineers, physicists and clinicians from more than 50 countries currently work at the LCSB. We excel because we are truly
-
various disciplines: computer scientists, mathematicians, biologists, chemists, engineers, physicists and clinicians from more than 50 countries currently work at the LCSB. We excel because we are truly
-
, with a focus on solid tumors such as breast cancer and lung cancer. For more information and to apply, send a motivation letter, CV and contact information for 2 references to Lucie Peduto (lucie.peduto
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and