83 programming-"https:"-"Inserm"-"FEMTO-ST" "https:" "https:" "https:" "https:" "https:" "https:" "J" positions at University of Lund
Sort by
Refine Your Search
-
Duties The PhD programme in political science consists of 240 credits (equivalent to four years of full-time studies) and is concluded with the public defense of a doctoral thesis. The appointed
-
at: https://www.soclaw.lu.se/en/research/doctoral-studies/phd-handbook General Requirements The requirements for admission to third cycle courses and study programs (in accordance with HF, Chapter 7, Section
-
period. More information about the doctoral programme is available at: https://www.soclaw.lu.se/en/research/doctoral-studies/phd-handbook General Requirements The requirements for admission to third cycle
-
environment. For more information: https://www.nano.lu.se/facilities/lund-nano-lab We offer In this position, you will get the opportunity to work in a world class research environment with highly qualified
-
from the online interview will be invited to a half-day on-site assessment in Week 10. For further information, please visit: https://www.lunduniversity.lu.se/about-lund-university/work-lund-university
-
take the opportunity to make a real difference! Probationary period may apply. Please note that these dates are preliminary and may be subject to change. For further information, please visit: https
-
subject is divided into a range of sub-disciplines and specialisations. The PhD programme at the Department of Biology includes many of these specialisations, from molecular biology to applied ecology, from
-
doctoral programme, which includes participation in research projects as well as third cycle courses, seminars and conferences. The work duties include: Design of ultrabroadband hyperspectral lidar (900-2500
-
, Software Development in programming languages and tools, Artificial Intelligence, Robotics, Natural Language Processing, Embedded Systems and Theoretical Computer Science. More about Graphics Group
-
principles for analysing program code. This includes how AI models can be used to analyze and correct software to ensure that it does not contain vulnerabilities. For example, it has been shown that AI