Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
, seven European universities from the Coimbra network, and partner universities from across the globe to explore further how we can effectively decolonise university heritage. Through analyses
-
) in the fields of satellite telecommunications network architectures, techniques and algorithms (coding, modulation, access, synchronisation and networking), system tools and telecom equipment. Duties
-
. Oversee the specification, design, procurement and verification of payload hardware and software, coordinating with internal teams and external partners. Define technical and programmatic requirements
-
such as software security, network security, security measurement, AI security, usable security, or systems security. The ideal candidate will complement and strengthen our growing security team and
-
long-term plans for all activities of the Directorate, as well as related schedules, financial plans, workforce plans (staff and contractors), procurement plans; defining the Directorate’s budgets and
-
Computational Linguistics, Argumentation Theory, and Social Network Analysis to (1) investigate how climate misinformation contributes to political polarization and (2) assess whether AI-generated, argumentative
-
work environment with an open culture, where you can be yourself and we pay attention to each other and to the world around us. Make the most of our bicycle budget, or join networks such as Young@EUR
-
collaboration, you will define the research strategy and lead the team of academic and support staff in an inclusive and motivating way. You will use your scientific expertise and network to support and
-
(the Netherlands) The PhD Project The defining core of the project is the requirement to include the archaeological record of the southeastern part of the province of Friesland (the Netherlands) – a landscape that
-
; incorporating inputs (security architecture, security requirements, etc.) from system level, defining ground segment system security architectures, including ground segment security monitoring and interfaces with