201 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "U.S" "U.S" positions at Technical University of Munich
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
EdTech Centre. Your Tasks Students increasingly learn with LLMs, but we don’t yet have the tools to tell when that collaboration is effective. This PhD develops computational approaches to characterise
-
application, you confirm that you have acknowledged the above data protection information of TUM. Kontakt: friedrich.esch@tum.de More Information http://www.ch.nat.tum.de/pc
-
hydrogen storage to maximize energy efficiency while keeping the grid reliable and secure. Our research method is engineering-oriented, prototype-driven, and highly interdisciplinary. Our typical research
-
individual career development. More information about the group is available at https://www.ep.mgt.tum.de/en/gia/home. Payment will be based on the Collective Agreement for the Civil Service of the Länder (TV
-
administration, industrial engineering, business informatics, or economics), informatics, or natural sciences/engineering with an outstanding degree (resp. graduation shortly) Internships or other professional
-
. In the ELUD research project, we address the question of if and when learning agents converge to an efficient equilibrium and when this is not the case. ELUD will design new algorithms for computing
-
, certificates, references, and publications) by 13 April 2026 to the following form: https://wkf.ms/4beNUNa Equal opportunity: The Technical University of Munich seeks to increase the proportion of women in
-
. Your qualifications: Master’s degree in Aerospace Engineering, Mechanical Engineering, Computer Science, Electrical Engineering, or a related field. Strong interest and commitment to pursuing a Ph.D
-
they interact and connect with each other. The doctoral researcher will develop computational indicators that capture these patterns from digital communication data, model how learning relationships form and
-
-cell communication, and cellular plasticity—all without destroying the sample. (https://www.cell.com/cell/fulltext/S0092-8674(25)00288-0 , https://www.biorxiv.org/content/10.1101/2024.11.11.622832v1