14 proof-checking-postdoc-computerscience PhD positions at University of Amsterdam (UvA)
Sort by
Refine Your Search
-
and profile: Educational background: You should have a Master’s degree in mathematics or AI/computer science (with a strong mathematical component, including writing formal mathematical proofs), to be
-
and work experience; a short letter of motivation; a link to your PhD thesis; the name and email address of a reference who can provide a letter of recommendation, e.g. the PhD or postdoc supervisor
-
via the link below will be considered. Please don’t send any applications by email. A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines
-
, Assistant Professor Email: j.s.pfeilmeier@uva.nl A knowledge security check can be part of the selection procedure. (for details: national knowledge security guidelines ) Where to apply Website https
-
until the position is filled. A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Only complete applications received within
-
of joint authorship, please clearly indicate your own contribution) the names, affiliations, and email addresses of two references who can provide letters of recommendation. A knowledge security check can be
-
referees. A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Applications must be submitted no later than 3 November 2025. Only
-
addresses of two references who can provide letters of recommendation. A knowledge security check can be part of the selection procedure. (for details: national knowle national knowledge security guidelines
-
motivation detailing your prior experience and your fit for the project (1 page max.); A research plan for your PhD, including a provisional four-year work plan (2-4 pages); Your CV; A transcript of grades
-
information of two academic referees A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Only complete applications received within