Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
diverse backgrounds (e.g., economics, engineering, computer science, information systems, etc.), united in pursuit of sustainable solutions that positively impact and shape a low-carbon economy and society
-
anonymization Conduct interviews with the involved stakeholders Disseminate results through scientific publications in outlets on the intersection between information systems, computer science, and energy markets
-
specialized nursing sciences in the fields of surgery, anaesthesia/resuscitation, paediatrics, and mental health. A fifth programme ‘Bachelor of Nursing in General Care’ started in September 2024, while two
-
research the Growing schools; Growing futures initiative, thereby contributing to the research program of the SciTeach Center team, led by Prof. Dr. Christina Siry. The PhD candidate will engage in
-
. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography
-
Living and working in Luxembourg Luxembourg, the only Grand Duchy in the world, is a dynamic country at the heart of Europe, known for its high quality of life, multiculturalism, and rich blend of history and modernity. With more than 170 nationalities represented and nearly half of the...
-
society. For more information, please visit our website: https://www.uni.lu/snt-en/research-groups/finatrax/ The person will pursue a Ph.D. degree (Doctorate) in computer science and information system
-
relevant topics in biology, mathematics, computer science, physics and sustainability. The University of Luxembourg is seeking to make an appointment within the Scienteens Lab as soon as possible for a three
-
Qualification: Master in Computer Science and/or Cybersecurity or equivalent degrees with expertise in at least one of the above areas (dependability, real-time systems, operating systems
-
Qualification: PhD in Computer Science Experience in dependable systems, real-time and embedded systems and/or operating systems and the threats and attacks they are exposed to is highly valuable