Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
application deadline (August 24, 2025) at the latest. Applicants selected for an interview will be notified by August 27, 2025. We intend to schedule interviews (in person or via Zoom) in the first week of
-
application deadline (September 2, 2025) at the latest. Applicants selected for an interview will be notified by September 5, 2025. We intend to schedule interviews (in person or via Zoom) in the second week of
-
the coordination of visits including scheduling appointments with other university departments, preparing briefings, booking equipment, facilities and refreshments as required To write and manage grant applications
-
background ranging from mathematics and theoretical physics all the way to numerical simulation algorithms? Then apply now to join our team of theoretical researchers in the Quantum Information and Quantum
-
, virtual assistants, or AI-driven systems such as chatbots, recommender algorithms, or generative AI. The position focuses on how communicative processes are shaped by and shape these technologies
-
outstanding candidates whose work lies at the intersection of statistics, machine learning, data analytics and modern AI algorithms. This includes, in particular, statistics for high-dimensional and complex
-
database To assist with the coordination of visits including scheduling appointments with other university departments, preparing briefings, booking equipment, facilities and refreshments as required
-
working in the research group “Theory and Applications of Algorithms” at the Faculty of Computer Science. The position is limited to six months and is planned to be filled from 01.10.2025. Your future tasks
-
ancient epic or ancient drama is desirable; interest in literary theory, narratology, and reception history is also welcomed Demonstrated research competence and independent research initiative through
-
group “Foundations of Cryptography” within the research group “Theory and Applications of Algorithms” at the department of Computer Science focuses on provable security of cryptographic schemes. We