Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
penetration testing (ethical hacking) Formal methods for security Human-centered cybersecurity Privacy and privacy enhancing technologies Security engineering Hardware security Security in pervasive computing
-
these exiting domains. Topics include but are not limited to remote direct memory access, hardware offloading and acceleration, AI for networking and security, storage management, cryptography, and architecture
-
to develop efficiently, this requires competencies in optical and quantum physics, experience in development of experimental control hardware, and perseverance and ingenuity. The positions are part of
-
optoelectronics and cryogenic device platforms in the context of artificial neural networks and neuromorphics. Information on the department can be found at: https://qdev.nbi.ku.dk/ Our research Our group conducts
-
interface, and all the way to quantum algorithms and applications. The long-term mission of the programme is to develop fault-tolerant quantum computing hardware and quantum algorithms that solve life-science
-
architecture, computer systems, or chip design. You could have insights in, among others, System-on-Chip (SoC) and chiplet designs, with an emphasis on energy-efficient processors; hardware-software co-design to
-
validation of energy system solutions will be an advantage. Strong programming skills in Python, MATLAB or similar environments are required, and it will be advantage if you have worked with hardware-in
-
interface, and all the way to quantum algorithms and applications. The long-term mission of the programme is to develop fault-tolerant quantum computing hardware and quantum algorithms that solve life
-
hardware setups. Collaborating and supporting other team members with research tasks within space weather, sensor fusion, GNSS-Reflectometry (GNSS-R) and jamming/spoofing. Support and assist with teaching in
-
into energy and battery management systems. • Collaborate with industrial partners on validation through hardware-in-the-loop testing and real-world demonstrations. • Contribute technical evidence for