Sort by
Refine Your Search
-
, Computer Science, Life Sciences and Medicine. Through its dual mission of teaching and research, the FSTM seeks to generate and disseminate knowledge and train new generations of responsible citizens in
-
Organization (RTO) active in the fields of materials, environment and IT. By transforming scientific knowledge into technologies, smart data and tools, LIST empowers citizens in their choices, public authorities
-
relevant state-of-the-art technologies. S/He will benefit from an active seminar program, international conference attendances, opportunities for professional growth. The project will be carried out in
-
translated into comprehensive regional action plans and guiding documents. Two solutions - one focusing on medicine use and the other on wastewater treatment - will be designed and developed to reduce
-
and outreach activities of the department. The following topics are indications of possible research directions. - Post-quantum cryptography and fully-homomorphic encryption (Jean-Sébastien Coron
-
community of researchers of the University. The successful person is expected to participate in the following activities: Conduct highly innovative research in Cybersecurity preparedness - User-centered
-
on how to use and create digital technologies to study and improve human’s lives (e.g., by enhancing learning, improving mental health, teaching green skills, strengthening cybersecurity). The xCIT team is
-
use tools such as artificial intelligence/machine learning, graph theory and graph-signal processing, and convex/non-convex optimization. Furthermore, our activities are experimentally driven and
-
. The candidate is, however, welcome to suggest any other topic within the overarching project theme. The doctoral candidate will contribute to the teaching of classes ranging from one to three hours per
-
agenda and to the excellence of the group and of SnT in general. Successful candidates are expected to participate in the following activities: Conduct highly innovative research in the cybersecurity