23 high-performance-quantum-computing "https:" "Simons Foundation" PhD positions at University of Twente
Sort by
Refine Your Search
-
platforms capable of efficiently tackling some of the most challenging computational problems in science and industry, underpinning applications ranging from materials discovery and quantum chemistry to
-
Vacancies PhD Position: Design and development of energy efficient and affordable magnetocaloric heat pump (MagHeat) Key takeaways This is a unique opportunity to play a central role in the EU
-
shaping at the University of Twente, many applications have arisen, ranging from quantum security to microscopy. The key challenge of wavefront shaping is to find out exactly how to shape the light to form
-
discussions, opportunities for collaboration, and access to expertise in numerical analysis, dynamical systems, and high-performance computing. The position includes funding to present your work at leading
-
the MSuS and AOT groups, allowing extensive collaboration and knowledge exchange. As part of the PhD program, you would have the opportunity to receive further education within the Twente Graduate School and
-
perspectives in psychology, education, computer sciences, law, and philosophy. Four WPs address citizen-empowerment-scenarios (CES) in healthcare, mobility, public governance, and healthy living. Each PhD
-
perspectives in psychology, education, computer sciences, law, and philosophy. Four WPs address citizen-empowerment-scenarios (CES) in healthcare, mobility, public governance, and healthy living. Each PhD
-
innovative programme within the Chemical Science & Engineering curriculum at the University of Twente. It aims to equip students with the skills and mindset needed to tackle complex global challenges such as
-
devices that can operate in confined anatomical environments and interact with biological tissue with high spatial precision. This PhD project focuses on the development of surgical micro-robotic devices
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate