23 web-programmer-developer-"https:"-"https:"-"https:"-"https:" PhD positions at University of Twente
Sort by
Refine Your Search
-
Vacancies PhD Position in Circular Infrastructure Hubs & Digital Matchmaking (RE:Match.D Project) Key takeaways This PhD position is part of RE:Match.D, which aims to develop a digital matchmaking
-
& Development programmes to cross-disciplinary research programmes in any of our five research themes: Emerging Technologies & Societal Transformations; Resilience; Smart Industry; Learning; and Health
-
. The program develops scientific knowledge, models and simulation tools to support marine spatial planning in a multi-stakeholder co-creation process. You will join a team of 17 PhDs and postdocs across
-
Vacancies Academic staff Support staff UT Student Jobs UT as employer UT as employer Employment conditions Career and development Pre and onboarding Tenure Track PhD EngD Working as a UT student
-
patterns of fire dynamics in the target region from satellite data; the development of an empirical model linking land-use change and socio-economic developments to fire dynamics; the assessment of effects
-
Vacancies Academic staff Support staff UT Student Jobs UT as employer UT as employer Employment conditions Career and development Pre and onboarding Tenure Track PhD EngD Working as a UT student
-
. This evolution calls for new methodologies capable of effectively representing and compressing data in infinite-dimensional settings. In this project, we aim to address this challenge by developing a theoretical
-
Vacancies PhD position on attacks against large language models (LLMs) Key takeaways This project will investigate attacks on large language models (LLMs), a major recent development in artificial
-
the nanoregime. It is our mission to excel in the field of nanoelectronics through the development of novel (concepts for) electronic devices and systems with nanoscale dimensions for application in future
-
of activation. This project aims to close this gap by developing methods to identify malicious domains closer to their inception, as soon as indicators of compromise surface. Building on our prior work using