Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
Municipalities, which is funded by the Velux Foundation. Read Velux’s presentation of the project at: https://veluxfonden.dk/en/projekt/migrant-solidarity-network-local-dynamics-civil-society-and-municipalities
-
Robotics. Further information Please visit us on LinkedIn: https://www.linkedin.com/company/sdu-robotics . Further information about this position is available via email to Assistant Professor Di Wu diwu
-
research group "AI and big data in Radiation Oncology" (read more about the group here: https://www.en.auh.dk/departments/the-danish-centre-for-particle-therapy/research/research-groups/artificial
-
background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted
-
the safety, compliance, and integrity of the workplace. Salary and terms of employment The employment is in accordance with the Ministerial Order on the Appointment of Academic Staff at Universities
-
for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU Compute DTU Compute – Department of Mathematics and Computer Science – is an
-
Department of Physics at https://physics.dtu.dk/ . If you are applying from abroad, you may find useful information on working in Denmark and at DTU at DTU – Moving to Denmark . Application procedure Your
-
in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. About DTU Aqua DTU
-
visit us on LinkedIn: https://www.linkedin.com/company/sdu-robotics . If you experience technical problems, you must contact hcm-support@sdu.dk . Further information for international applicants about
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open