Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
to the project’s emphasis on research communication and societal impact, including dissemination formats and public-facing outputs. Engage actively in the intellectual life of IOB (seminars, reading groups
-
you require the monthly stipend and, if so, please justify the costs that require funding (within the scope of housing and costs related to your stay). We strongly advise you to get in touch in advance
-
for cycling policy. It seeks to understand current cycling cultures, identify key factors influencing cycling, develop scenarios for 2050, and assess the impact of those scenarios on different socio-economic
-
. The labs are strongly focused on integrating the wet lab and computational sides. You will work closely together with fellow computational and experimental colleagues, ensuring the data is analyzed in a
-
for candidates who share a passion for science that generates an impact on society and care deeply about supporting each other's growth. How to apply If you are interested in this challenging and rewarding
-
data center, compute, storage, networking, and core services Ensure high availability, performance, security, and compliance of infrastructure platforms Manage capacity planning, lifecycle management
-
not human activities as such, but rather how biotic communities responded to anthropogenic pressures. More specifically, the project studies the impact of the socio-economic pressures generated by
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
administration) Duration BOF doctoral scholarship with label In accordance with the regulations for PhD scholarship recipients, the doctoral program starts by definition with a scholarship agreement of 1 year. If
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and