46 application-programming-android-"Prof" PhD positions at University of Luxembourg in Luxembourg
Sort by
Refine Your Search
-
Applications should include: Curriculum Vitae Cover letter Early application is highly encouraged, as the applications will be processed upon reception. Please apply ONLINE formally through the HR
-
& Applications. The "Technical Standardisation for Trustworthy and Sustainable ICT, Construction, and Aerospace" research programme represents a strategic collaboration between Luxembourg Institute
-
Applications should include: Curriculum Vitae Cover letter Early application is highly encouraged, as the applications will be processed upon reception. To ensure full consideration, candidates
-
Applications should include: Curriculum Vitae with the list of publications Cover letter Copies of previous degrees Names and contact details of two academic referees Early application is highly
-
Applications should include: Curriculum Vitae including a list of publications or manuscripts in preparation (if applicable) and details of MSc training Cover letter Copies of degree certificates
-
. For more information, please visit our website: www.uni.lu/snt-en/research-groups/finatrax/ Candidates will be enrolled in the PhD program in Computer Science and Computer Engineering with
-
Applications should include: Curriculum Vitae with at least 2 references (contact details only) Cover letter Early application is highly encouraged, as the applications will be processed upon
-
). This project aims to accelerate the energy transition in Luxembourg by co-creating an ambitious research program. It will utilize a data-driven approach to support decision-making for an optimal energy system
-
Pathogenesis in the age of the microbiome (MICRO-PATH; https://micro-path.uni.lu ) is a highly competitive, interdisciplinary, research-intensive PhD training programme, supported by the PRIDE
-
adapted from traditional application security testing methodologies and fail to account for the specific challenges posed by GenAI. For example, adversarial attack testing, model inversion vulnerabilities