186 computer-programmer-"https:"-"FEMTO-ST" "https:" "https:" "https:" "https:" "U.S" positions at Technical University of Munich in Germany
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
knowledge of the German language besides English. If interested, please send your full application to the email adress provided below. At the Mechanics & High Performance Computing Group, there is an open
-
04.11.2025, Wissenschaftliches Personal We are looking for a full-time employee to join our team working on the EUROfusion project, starting on January 1, 2026 as Scientific Advisor to the Program
-
Dec 2025 - 23:00 (UTC) Type of Contract To be defined Job Status Full-time Hours Per Week To be defined Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Is the
-
04.02.2026, Academic staff The successful candidates will be part of the Munich Climate Center and the Earth System Modelling group at TUM (https://www.asg.ed.tum.de/esm/home/) and will be closely
-
20.01.2026, Academic staff In the framework of the DFG priority program 1374 "Biodiversity Exploratories" We invite application for a (www.biodiversity-exploratories.de) the Arthopods project is
-
-cell communication, and cellular plasticity—all without destroying the sample. (https://www.cell.com/cell/fulltext/S0092-8674(25)00288-0 , https://www.biorxiv.org/content/10.1101/2024.11.11.622832v1
-
tailored computational methods are needed. This project aims at combining probabilistic machine learning methods with prior knowledge in the form of graphs to analyze and predict food-effector systems. Key
-
molecular level. To yield new insights into food-effector systems, sophisticated and tailored computational methods are needed. This project aims at leveraging graph-theoretic approaches to analyze and
-
. In the ELUD research project, we address the question of if and when learning agents converge to an efficient equilibrium and when this is not the case. ELUD will design new algorithms for computing
-
. Classical cryptographic techniques face inherent limitations, especially regarding future threats from quantum computers or AI-driven adversarial strategies. Physical layer security offers a promising