63 data-"https:" "https:" "https:" "https:" "https:" "https:" "Eindhoven University of Technology (TU" positions at University of Twente
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
cookies and similar technologies to process your personal data (e.g. IP address) for personalised content, ads and third-party media integrations. Functional and strictly analytical cookies are always set
-
of Twente, in close collaboration with the MESA+ Institute for Nanotechnology and clinical and international partners. Information and application You can apply for this position until 31 March 2026 by
-
by further model improvements, and implementation or design of a robust workflow and predictive design tool. Information and application For more information about this vacancy you can contact Dr
-
(such as data annotation, online content creation, or software testing) provide chances for social enterprises – i.e. mission-driven business that prioritize societal impact above maximizing profit, such as
-
to process your personal data (e.g. IP address) for personalised content, ads and third-party media integrations. Functional and strictly analytical cookies are always set. Non-essential and non-analytical
-
, 2020 . In this PhD project you will work on applying RNPU networks for solving computational problems that are considered hard. Information and application Are you interested in this position? Please
-
, fundamental research and/or studies involving matters of scientific urgency. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before
-
, involving a large network of academic and industrial partners across the Netherlands. Information and application Are you interested in this position? Please send your application via the 'Apply now' button
-
dynamics and aerodynamics aspects, thereby contributing to the education of the engineers of the future. Information and application For more information about this position, please contact the secretary of
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate