Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- University of Oslo
- Nature Careers
- Technical University of Denmark
- University of Texas at Austin
- California State University, San Bernardino
- Duke University
- Nanyang Technological University
- University of Glasgow
- Argonne
- Heriot Watt University
- ;
- NEW YORK UNIVERSITY ABU DHABI
- North Carolina State University
- State University of New York University at Albany
- The University of Chicago
- University of British Columbia
- University of Maryland
- ; University of Cambridge
- AALTO UNIVERSITY
- Aarhus University
- CEA
- Canadian Association for Neuroscience
- Chalmers University of Technology
- Cornell University
- Durham University
- Erasmus University Rotterdam
- Leibniz
- Ludwig-Maximilians-Universität München •
- NTNU - Norwegian University of Science and Technology
- Northeastern University
- Oak Ridge National Laboratory
- Purdue University
- Technical University of Munich
- Texas A&M TVMDL
- Ulster University
- Umeå University
- University of Cambridge
- University of Kansas
- University of Michigan
- University of Minnesota
- University of Nebraska–Lincoln
- University of Nottingham
- University of Oxford
- University of Pennsylvania
- University of Sheffield
- University of Texas at El Paso
- University of Toronto
- University of Virginia
- Western Norway University of Applied Sciences
- 39 more »
- « less
-
Field
-
and approaches to improve the software engineering process in Continental, especially requirement engineering and testing Conducting the research in combining AI techniques with formal methods
-
transition of quality advisors in the non-formal education sector towards their new exclusive role as quality facilitators. The objectives are to systematically document and analyse organisational and
-
domains and formal methods Applying the developed research ideas and approaches to improve the software engineering process in Continental, especially requirement engineering and testing Conducting
-
developed by our team [1,2] are able to: 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security
-
Computer Science). Outstanding candidates who do not have a PhD but wish to pursue one on the topic of this project will also be considered. x Knowledge and experience in software developments or formal