62 data-"https:" "https:" "https:" "https:" "https:" "https:" "Here We Are" PhD scholarships at Technical University of Munich
Sort by
Refine Your Search
-
privacy policy on collecting and processing personal data in the course of the application process pursuant to Art. 13 of the General Data Protection Regulation of the European Union (GDPR) at https
-
application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: adrian.doerfler@tum.de More Information http://www.mos.ed.tum.de/nma
-
12.01.2026, Academic staff The Professorship of Machine Learning at the Department of Computer Engineering at TUM has an open position for a doctoral researcher (TV-L E13 100%; initial contract 1.5
-
application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: friedrich.esch@tum.de More Information http://www.ch.nat.tum.de/pc
-
-funded DECIPHER-M consortium (9 partners, €9M), we are building multimodal foundation models that integrate imaging, text, and structured clinical data to predict metastasis risk and identify tumor origin
-
preferential consideration in cases of essentially equal qualification (§ 2 SGB IX). Contact and Application More information on the working group can be found here: https://www.leibniz-lsb.de/en/research
-
status will be given preferential consideration in cases of essentially equal qualification (§ 2 SGB IX). Contact and Application More information on the working group can be found here: https
-
application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: thesis.mhpc@ed.tum.de More Information https://www.epc.ed.tum.de/mhpc
-
information please refer to: https://www.wmi.badw.de/fileadmin/WMI/JobAnnouncements/2025_11_06.PhD_position_KF_2026.pdf The position is suitable for disabled persons. Disabled applicants will be given
-
communication systems for AI-driven applications. The objective is to investigate, design, and experimentally validate information-theoretically secure coding schemes tailored to the demanding requirements