Sort by
Refine Your Search
-
models, contributing to bridge transport economics, network modelling and activity-based modelling, and leverage different types of (big) data. The applicant should be a creative and motivated researcher
-
will be working on developing multi-scale and multi-modal models, contributing to bridge transport economics, network modelling and activity-based modelling, and leverage different types of (big) data
-
. Experience and skills Hands-on experience with RT-HIL and rapid prototyping (dSPACE and OPAL-RT) Background in communication networks and protocols Familiar with networked controllers and meters Proficiency in
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
contracts); Strong institutional support for career development, including training, mentoring, and participation in international conferences and networks; LISER is strongly committed to diversity and
-
infrastructure, and the organisation of actors and networks. The aim is to identify the defining characteristics of youth-oriented municipalities, highlight examples of good practice, analyse key factors
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
on other team projects. The researcher will work under the supervision of Dr Sophie Pilleron, the head of the ACADI team. He/she will benefit from expertise from the international network of Dr Pilleron in
-
networks. The aim is to identify the defining characteristics of youth-oriented municipalities, highlight examples of good practice, analyse key factors for success, and determine developmental needs as
-
. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography