12 coding-"https:"-"FEMTO-ST"-"CSIC" "https:" "https:" "https:" "https:" "https:" "https:" "Dr" PhD scholarships at Umeå University
Sort by
Refine Your Search
-
and technical support functions, along with good employment conditions. More information about the department is available at: https://www.umu.se/en/department-of-computing-science/ . Project
-
. Project description and tasks The successful applicant will study problems in extremal and probabilistic combinatorics, as part of Dr. Maryam Sharifzadeh’s project Induced saturation problems
-
. The department conducts undergraduate education and research in political science and peace and conflict studies. For more information, see https://www.umu.se/en/department-of-political-science/ . General
-
administrative and technical services—all within a setting that offers attractive employment conditions. To learn more about the department, please visit: https://www.umu.se/en/department-of-computing-science
-
University campus. The department has approximately 160 staff members, of which 30 are PhD students. For more information, visit https://www.umu.se/en/department-of-ecology-and-environmental-science/
-
. The department conducts undergraduate education and research in political science and peace and conflict studies. For more information, see https://www.umu.se/en/department-of-political-science/ . General
-
tools, which can be used to analyze massive amounts of scMetaG data. In addition to being affiliated with the Department of Clinical Microbiology at Umeå University (https://www.umu.se/en/department
-
part of a research group active in the area of molecular geochemistry (http://moleculargeo.chem.umu.se ) at the Department of Chemistry (https://www.umu.se/chemistry ), with many years of experience in
-
an employee at Umeå University here: https://www.umu.se/en/work-with-us/benefits/ . Application You apply via our e-recruitment system Varbi. Log in and apply via the button at the bottom of the page
-
constraints such as sensitive devices running in a medical environment could be considered. Keywords for this project: code analysis, static analysis, reverse engineering, defense mechanisms, vulnerability