Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- University of Groningen
- Delft University of Technology (TU Delft)
- Wageningen University and Research Center
- Delft University of Technology (TU Delft); Delft
- Radboud University
- CWI
- University of Amsterdam (UvA)
- University of Amsterdam (UvA); Amsterdam
- Delft University of Technology
- Eindhoven University of Technology (TU/e)
- Erasmus University Rotterdam
- Leiden University
- University of Groningen; Groningen
- University of Twente
- University of Twente (UT)
- Utrecht University
- 6 more »
- « less
-
Field
-
to smart navigation systems. However, realizing neuromorphic computing in practice presents significant challenges, particularly in the areas of energy efficiency, reliability, and security. The REACT MSCA
-
safety? Join our PhD project on the legal role of ‘trusted flaggers’, a key but underexplored mechanism in EU content moderation. Help shape how the Digital Services Act is interpreted and applied, as part
-
engineering, system engineering, or related fields. Solid background in process safety, quantitative risk assessment, and simulation methods. Experience in programming and/or safety analysis software. Familiar
-
cryptography guarantees better performance and faster speed for encrypting data. Without doubt, AES (Advanced Encryption Standard) and Keccak/SHA-3 (Secure Hash Algorithm 3) are the two most used and famous
-
—combining the compliance and safety of soft systems with the precision and performance required for impactful applications. The PhD candidate will be encouraged to actively shape the direction of the research
-
select technical industries. The analysis will focus on case studies from industries partnering with the project. This position is embedded in the Security, Technology and e-Privacy Research Group (STeP
-
the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8 of the National Knowledge
-
who can provide letters of recommendation. A knowledge security check can be part of the selection procedure. (for details national knowledge security guidelines ) Only complete applications received
-
predict cycling travel conditions from various perspectives (safety, crowding, travel time, comfort, etc.). Therefore, various data sources including real-time traffic counts from inductive loop detectors
-
analytics (statistical models, machine learning, uncertainty quantification) to monitor and predict cycling travel conditions from various perspectives (safety, crowding, travel time, comfort, etc