24 proof-checking-postdoc-computerscience PhD positions at University of Southern Denmark
Sort by
Refine Your Search
-
. The successful candidate will be based in Odense, under the primary supervision of Prof. Ricardo J. G. B. Campello , but they will be expected to also work closely with other PhD students, postdocs, and
-
Administrator, an Administrative Supporter and approximately 10-15 PhD students, postdocs, and visiting scientists. Several POLIMA researchers have attracted prestigious personal grants, e.g., Villum Investigator
-
be employed in accordance with the agreement on salaried PhD scholars between the Ministry of Finance and AC (the Danish Confederation of Professional Associations). Please check links for more
-
approximation algorithm, using linear programming methods. Over the next years, the project will grow to a collaborate team of 4-5 PhD students and Postdocs. The successful candidate will work directly with the
-
. Therefore, based on information from open sources, background checks may be conducted on candidates for the position. Further information for international applicants about entering and working in Denmark
-
security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position. Where to apply Website https://fa-eosd-saasfaprod1
-
of security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position. International applicants and others needing information
-
unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position. Further
-
unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background checks may be conducted on candidates for the position. Further
-
research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background checks