Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
- European Space Agency
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology (TU/e)
- Delft University of Technology (TU Delft); yesterday published
- University of Groningen
- Delft University of Technology (TU Delft); Delft
- Leiden University
- University of Amsterdam (UvA)
- Eindhoven University of Technology (TU/e); Eindhoven
- University of Twente
- University of Twente (UT)
- Eindhoven University of Technology (TU/e); today published
- Erasmus University Rotterdam
- Maastricht University (UM)
- University of Amsterdam (UvA); Amsterdam
- University of Twente (UT); Enschede
- Leiden University; Leiden
- Wageningen University & Research
- Delft University of Technology (TU Delft); 17 Oct ’25 published
- Delft University of Technology (TU Delft); today published
- Maastricht University (UM); Maastricht
- Radboud University
- University of Amsterdam (UvA); Published today
- Utrecht University
- Vrije Universiteit Amsterdam (VU)
- Delft University of Technology (TU Delft); 16 Oct ’25 published
- Eindhoven University of Technology (TU/e); 4 Oct ’25 published
- Eindhoven University of Technology (TU/e); Published yesterday
- Eindhoven University of Technology (TU/e); yesterday published
- Maastricht University (UM); 27 Sep ’25 published
- Maastricht University (UM); Published yesterday
- Radboud University Medical Center (Radboudumc); Nijmegen
- The Netherlands Cancer Institute
- The Netherlands Cancer Institute; Amsterdam
- Tilburg University
- Tilburg University; 16 Oct ’25 published
- Universiteit Maastricht (UM); 27 Sep ’25 published
- University Medical Center Utrecht (UMC Utrecht)
- University of Amsterdam (UvA); today published
- University of Groningen; Groningen
- University of Groningen; 26 Sep ’25 published
- University of Twente (UT); today published
- Utrecht University; Utrecht
- Wageningen University & Research; Wageningen
- 34 more »
- « less
-
Field
-
attacks and fault injection. In the hardware security domain, many novel security measures are being developed, such as advanced techniques for side-channel resistance and fault tolerance. However, to
-
: The use of data science and AI methods and techniques within the security and cyber domain, with special focus on ethics and algorithmic transparency; Human-Technology Interaction: Developing robots
-
to systematically analyse all trench documentation using data-driven methods to better interpret the reliability of underground maps? Your Role As an EngD candidate, you will work under supervision to develop a data
-
interpret the reliability of underground maps? Your Role As an EngD candidate, you will work under supervision to develop a data-driven model for assessing the reliability of official network maps (KLIC
-
Join TU Delft and work together with NXP to build low-power AI accelerators for self-healing analog/RF calibration, fixing noise/offset. Co-design algorithms & hardware and validate on real silicon
-
transportation systems may include a fleet autonomous cars, vans, and buses. This PhD position within FlexMobility will focus on the underlaying assignment and routing algorithms for real-time operation of
-
within FlexMobility will focus on the underlaying assignment and routing algorithms for real-time operation of the vehicle fleet and the multi-objective design of the mixed transporation network. Our key
-
expert knowledge in a reusable format. Numerical Representation, Develop numerical representations of ship designs that are interpretable by machine learning algorithms and suitable for generative ai model
-
. While the chosen design has a significant effect on the most important aspects of users’ experience, the algorithms, and thus the supply decisions, are based on users’ preferences. This PhD position
-
strong background in machine learning, computer vision, or data-driven modeling. You have extensive experience in the development and implementation of AI and machine learning algorithms, ideally with