Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
are expected to be fluent in at least one of these languages, and in time are expected to master both. As a formal qualification you must hold a PhD degree (or equivalent). If you are applying
-
meet all our requirements, apply anyway - you could be the ideal candidate for us. As a formal qualification, you must hold a PhD degree (or equivalent). We offer DTU is a leading technical university
-
formal qualification you must hold a PhD degree (or equivalent). If you are applying for the associate professor position you should also have academic qualifications equivalent to those obtained by
-
formal qualification you must hold a PhD degree (or equivalent) within the field of chemistry / analytical chemistry as well as academic qualifications equivalent to those obtained by holding a position as
-
(industry, grid operators, regulators) and an interest in societal impact pathways As a formal qualification, you must hold a PhD degree (or equivalent). You will be assessed against the responsibilities and
-
on HPC clusters and on Linux/Unix environments. Previous experience with methods as FoldX, Rosetta, Molecular Dynamics Simulations, EVE and analyses of disease-related databases such as ClinVar or COSMIC
-
on the solid application of scientific research method. The department has a pluralistic approach to research methods that includes, for example, formal theoretical models, quantitative empirical methods such as
-
are expected to be fluent in at least one of these languages, and in time are expected to master both. As a formal qualification you must hold a PhD degree (or equivalent). If you are applying
-
memorization in LLMs Analysis of vulnerabilities in low-resource language settings, and the effect of typological diversity on the security landscape in multilingual settings Formal semantic or symbolic methods
-
penetration testing (ethical hacking) Formal methods for security Human-centered cybersecurity Privacy and privacy enhancing technologies Security engineering Hardware security Security in pervasive computing