140 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"Dr" positions in Switzerland
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
at the University of Zurich, the Department of Informatics at ETHZ and several further partners, we address the challenge by the combining microfluidic technology, sequencing and fast data analysis. In
-
equipment, manage samples, and ensure lab safety while contributing to innovative projects. What You'll Do: Fix, embed, section, and stain tissue samples (H&E, IHC, and specialized stains). Operate and
-
to inform model adaptation and performance evaluation. Implementing ROM methodologies for fluid–structure interaction in wind turbine systems, balancing accuracy and computational efficiency. Validating
-
of Computational Fluid Dynamics CFD environment and simulations including: - Computation of the microwave field, Coupling of the microwave field with the plasma - Computation of elementary ionization, recombination
-
component of solid-state transformers (SSTs). Such SSTs are required, for example, in future AI data centres, where power consumption per computer rack increases to levels of several hundred kilowatts or even
-
disciplines to address pressing challenges related to food and nutrition security, environmental and human health and social wellbeing. Beyond supporting research activities across the entire food system
-
. Neuromorphic computing and ML deployment on digital and neuromorphic processors TinyML and EdgeAI and ultra-low-power inference for resource-constrained systems Techniques such as quantization, pruning
-
incl. lab books, protocols and research documents Onboarding support of new lab members incl. organization of bench and desk, basic equipment, security and biosafety instructions, lab tour Organization
-
100%, Zurich, fixed-term Human–Computer Interaction in Architecture and Digital Fabrication This fully funded, full-time PhD position spans four years and is embedded within the interdisciplinary
-
compromise grid reliability and energy security. We proceed in two steps. First, we use AI-based document analysis and engineering data to construct detailed bills of materials (BOMs) for selected critical