Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
, network resource management to improve the performance of the future wireless communication systems. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis
-
management to improve the performance of the future wireless communication systems. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis and optimization, we
-
, network resource management to improve the performance of the future wireless communication systems. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis
-
to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis and optimization, we use tools such as artificial intelligence/machine learning, graph theory and graph-signal
-
. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis and optimization, we use tools such as artificial intelligence/machine learning, quantum conputing
-
modelling of complex transport and logistics networks Contribute to the planning, execution, and supervision of research activities, ensuring high scientific quality in close collaboration with the Professor
-
management to improve the performance of the future wireless communication systems. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis and optimization, we
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
) with hardware in the loop functionalities to test and validate AI-based solutions in complex operation environments Working with rapid prototyping tools (dSPACE) to recreate charging profiles and
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security