Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
engineering, and have expertise in building camera systems and computer vision. This role also involves working closely with the other members of the team on projects related to plant phenotyping (assessing e.g
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
data center, compute, storage, networking, and core services Ensure high availability, performance, security, and compliance of infrastructure platforms Manage capacity planning, lifecycle management
-
of impacts of climate extremes in Europe, from public health to societal perspectives and agricultural impacts, and will have access to a rich program of training activities and research exchanges
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
administration) Duration BOF doctoral scholarship with label In accordance with the regulations for PhD scholarship recipients, the doctoral program starts by definition with a scholarship agreement of 1 year. If
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular