130 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" positions at Technical University of Munich in Germany
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
preferential consideration in cases of essentially equal qualification (§ 2 SGB IX). Contact and Application More information on the working group can be found here: https://www.leibniz-lsb.de/en/research
-
innovative impact projects through the power of AI. The Mission Mission-Driven Organizations (MDOs) handle thousands of complex projects globally. We want to revolutionize this through Data-Driven Impact. Key
-
application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: thesis.mhpc@ed.tum.de More Information https://www.epc.ed.tum.de/mhpc
-
-good university degree in economics - strong analytical and methodological skills with a focus on quantitative data analysis (e.g., econometrics, statistics, machine learning) - a high motivation and the
-
of TUM. Kontakt: fabian.frick@tum.de More Information https://www.ep.mgt.tum.de/en/pur/team/vacancies/
-
of personal data in the context of your application https://portal.mytum.de/kompass/datenschutz/Bewerbung/. By submitting your application, you confirm that you have taken note of TUM's data protection
-
of the General Data Protection Regulation (GDPR) http://go.tum.de/554159 regarding the collection and processing of personal data in the context of your application. By submitting your application, you confirm
-
)). By submitting your application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: Sekretariat.lls@ed.tum.de More Information https://www.asg.ed.tum.de/en/lls
-
information please refer to: https://www.wmi.badw.de/fileadmin/WMI/JobAnnouncements/2025_11_06.PhD_position_KF_2026.pdf The position is suitable for disabled persons. Disabled applicants will be given
-
communication systems for AI-driven applications. The objective is to investigate, design, and experimentally validate information-theoretically secure coding schemes tailored to the demanding requirements