Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
Job Description Do you want to apply artificial intelligence (AI) to solve real-world safety challenges and contribute to the green transition in shipping? At the Department of Technology
-
maintenance of equipment and instruments Handling and care of animal models Assistance with molecular experiments Training and supervision of students and new staff in laboratory procedures, safety routines
-
, networks, control systems, AI, sound, cyber security, and robotics. The department plays an active role in transferring inventions and results into applications in close collaboration with industrial
-
, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may
-
research infrastructure and lab facilities to conduct world-leading fundamental and applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background
-
implementation research, to National Reference Laboratories, international organizations, and supranational institutions such as the European Commission and the European Food Safety Authority. Our work focuses on
-
. The main task is to explore and implement novel efficient anonymous credential schemes which remain secure against quantum attackers. You should have: Master’s degree (or equivalent) in computer science or a
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may be