53 machine-learning-"https:" "https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" positions at University of Amsterdam (UvA)
Sort by
Refine Your Search
-
of theoretical computer science researchers in Amsterdam (https://theory.amsterdam ). What are you going to do? You are expected to: carry out original research in the field of theoretical computer science; have
-
: Design, coordinate, and teach Digital Marketing courses in BSc, MSc, and executive programs. Supervise BSc and MSc thesis projects and mentor students. Collaborate with colleagues to innovate and enhance
-
The vacancy closes on 27-04-2026. The first round of interviews will take place in May. Where to apply Website https://www.academictransfer.com/en/jobs/359720/postdoctoral-researcher-in-phil… Requirements
-
will take place in May. Where to apply Website https://www.academictransfer.com/en/jobs/359721/postdoctoral-researcher-in-phil… Requirements Additional Information Website for additional job details
-
on property theory, the position on modality or … Where to apply Website https://www.academictransfer.com/en/jobs/359727/two-phd-candidates-in-philosoph… Requirements Additional Information Website
-
January; multiple courses to follow from our Teaching and Learning Centre; a complete educational program for postdocs; multiple courses on topics such as leadership for academic staff; multiple courses
-
at interdisciplinary conferences alongside a team of psychologists, historians, and computer scientists. What do you have to offer Must-have: You have completed a PhD in psychology, computational social science
-
of (translational) neuroscience and applied physics and biomechanics, contributing to a project with major implications for health prevention in groups at high-risk of TBI, such as athletes and military personnel
-
Where to apply Website https://www.academictransfer.com/en/jobs/359139/postdoc-researcher-art-and-libe… Requirements Additional Information Website for additional job details https
-
to a quantum computer. Given the near-term deployment of quantum computing technologies, the time to deploy post-quantum secure cryptography is now. Further, in a world with quantum computers, one can