Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
at 23:59 hours local Danish time The position is funded by the German Research Foundation (DFG), project “Abstract Techniques for Programming Languages and Secure Compilation”. The project builds
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
of mechatronic devices, Very good communication skills in English. It is a condition of employment that you can obtain security clearance, and that the security clearance can be maintained during your employment
-
background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted
-
, religion, or ethnic background, are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU Health Tech With a vision to improve health and
-
processors. Enabling safe, secure and real-time automotive functionalities in the RISC-V world, RIGOLETTO will establish the foundation for a next-generation Automotive Computing Platform based on the open
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background
-
, regardless of personal background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures