Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
cheminformatics, differential privacy and cryptography. Artificial Intelligence, Cybersecurity and Programming Languages , focusing on choreographic programming, distributed computing (cloud, edge, IoT
-
Job Description The Department of Mathematics and Computer Science (IMADA) at the University of Southern Denmark (SDU), Campus Odense, invites applications for one PhD candidate position in
-
currently one of the important technologies in the field of LAIs. The common approach to manipulate the performance of LAI suspensions release rate relies on changing particle size distribution
-
Engineering Cybersecurity Distributed and Cloud Computing Operating Systems and Digital Infrastructure AI for Software Engineering Software Engineering for Internet of Things Software Engineering for Cyber
-
infrastructure and by providing support and expertise to researchers. The key areas of the center are High Performance Computing (HPC), Cloud Services, Data Analytics and Data Management Services. We assist a
-
methods (logic, theorem provers, type systems, categories, etc.), concurrent programming languages (choreographic programming, session types, etc.), distributed computing (cloud computing, microservices
-
programming, including embedded systems, programming of critical software and infrastructure, high-performance computing, and distributed systems. Model-driven Software Engineering Cybersecurity, including
-
will contribute to developing intelligent agent that supervises energy-efficient compute offloading over distributed edge and cloud. The application deadline is December 12, 2025, 2025 at 11.59 PM
-
languages (choreographic programming, session types, etc.), distributed computing (cloud computing, microservices, etc.), Dev(Sec)Ops, software engineering (software product lines), human factors in security
-
.), distributed computing (cloud computing, microservices, etc.), Dev(Sec)Ops, software engineering (software product lines), human factors in security and privacy, post-quantum and embedded cryptography, and