23 data-"https:" "https:" "https:" "https:" "University of Cambridge" PhD positions at University of Twente
Sort by
Refine Your Search
-
, interfacial phenomena, and performance degradation induced by e.g. salt accumulation or Al deposition. By leveraging your experimental data with the modelling approach of the collaborating Post Doc, we aim
-
as teaching assistants in courses taught by department staff members. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below
-
-traced models of the structures, based on STL files, 3-D voxel data and other input. You work closely with the rest of the team to integrate your models with the microscope hardware and GUI, with advanced
-
PhD position ‘Courage to Correct: Balancing Error Prevention and Learning in Strategic Crisis Teams’
costs. Yet this drive for error-free performance at a group level can unintentionally silence early warning signals on a personal level-such as when conflicting information during a bomb-threat response
-
of Twente, in close collaboration with the MESA+ Institute for Nanotechnology and clinical and international partners. Information and application You can apply for this position until 31 March 2026 by
-
(such as data annotation, online content creation, or software testing) provide chances for social enterprises – i.e. mission-driven business that prioritize societal impact above maximizing profit, such as
-
, 2020 . In this PhD project you will work on applying RNPU networks for solving computational problems that are considered hard. Information and application Are you interested in this position? Please
-
, fundamental research and/or studies involving matters of scientific urgency. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before
-
, involving a large network of academic and industrial partners across the Netherlands. Information and application Are you interested in this position? Please send your application via the 'Apply now' button
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate