Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
website about knowledge security. Please do not contact us for unsolicited services. Where to apply Website https://www.academictransfer.com/en/jobs/360167/postdoc-software-architectures-… Requirements
-
technical design of complex software infrastructures A good command of Dutch ((near-)native speaker) Independent thinker, analytical, meticulous, results-oriented, and collaborative personality Our
-
faculty is helping to make completely sustainable and future-proof. At the same time, we are developing the chips and sensors of the future, whilst also setting the foundations for the software technologies
-
DaVis 11 software. You have an aptitude for working in a team and excellent communication skills in spoken and written English. You have fundamental knowledge of fluid mechanics. You have strong
-
to the validation of an innovative hybrid satellite digital twin, the Titan Forge, which includes hardware and software components emulating the behaviour of the complete mission. This can speed-up the development
-
sensors of the future, whilst also setting the foundations for the software technologies to run on this new generation of equipment – which of course includes AI. Meanwhile we are pushing the limits
-
datasets and use statistical software such as Stata, R, or Python to produce robust results. Design appropriate causal strategies for evaluating policies or social programs. Translate theoretical and policy
-
development of simplified continuum-based models, enabling fast assessments across large quay wall networks. This position is part of the Bridge and Quay Walls (Bruggen en Kademuren) programme of
-
-information Science in BSc and MSc courses offered by the GRS chair group. Guide students through practical exercises that apply GIS concepts using various open- and closed-source software solutions. Introduce students
-
naturally leads to symmetric failure scenarios, which are reflected in BP models. However, current BP software can neither detect nor exploit these symmetries. As a result, despite BP’s strong modeling