Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
-dovrolis.html https://www.tudelft.nl/en/eemcs/the-faculty/departments/software-technology/networked-systems N. Mhaisen, G. Iosifidis, On the Dynamic Regret of Following the Regularized Leader: Optimism with
-
project (and a 2nd PostDoc vacancy within the project) can be found at its website: https://www.mobilitydesaignlab.nl/. Job requirements The candidate should have: a PhD degree in Artificial Intelligence
-
hidden patterns from them? Do you enjoy exploring mathematical models and working with network data? Join our team! Job description Complex systems are often modeled with networks, structures where
-
particular connectivity within and between complex system? Would you like to apply efficient AI techniques for adaptive configuration and optimization of industrial communication networks to enhance
-
description The functioning of cities depends more than ever on urban infrastructures like transportation networks, power grids, water networks, Internet of Things sensors, and analytics platforms that gather
-
fascinated by cutting-edge photonic technologies and their role in shaping the future of clean energy? Do you want to pioneer integrated photonic sensors for nuclear fusion diagnostics? Join us in developing
-
future-proof. At the same time, we are developing the chips and sensors of the future, whilst also setting the foundations for the software technologies to run on this new generation of equipment – which
-
sensors of the future, whilst also setting the foundations for the software technologies to run on this new generation of equipment – which of course includes AI. Meanwhile we are pushing the limits
-
lives. Technology such as the electricity grid, which our faculty is helping to make completely sustainable and future-proof. At the same time, we are developing the chips and sensors of the future
-
society's digital transformation. We work on the following topics: Systems Security, Network and Internet Security, Web Security and Privacy, Cyber Threat Intelligence, Privacy-Enhancing Technologies, and the