Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Utrecht University
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA)
- Wageningen University & Research
- Maastricht University (UM)
- University of Twente (UT)
- Vrije Universiteit Amsterdam (VU)
- Leiden University
- University of Twente
- Amsterdam UMC
- University Medical Center Utrecht (UMC Utrecht)
- Erasmus University Rotterdam
- Erasmus University Rotterdam (EUR)
- Radboud University
- Wetsus - European centre of excellence for sustainable water technology
- Erasmus MC (University Medical Center Rotterdam)
- NIOZ Royal Netherlands Institute for Sea Research
- Tilburg University
- University Medical Centre Groningen (UMCG)
- AMOLF
- DIFFER
- Delft University of Technology
- Eindhoven University of Technology
- KNAW
- NLR
- Radboud University Medical Center (Radboudumc)
- RiboPro B.V.
- University of Groningen
- 19 more »
- « less
-
Field
- Computer Science
- Engineering
- Biology
- Medical Sciences
- Economics
- Science
- Mathematics
- Chemistry
- Arts and Literature
- Humanities
- Materials Science
- Psychology
- Social Sciences
- Linguistics
- Physics
- Sports and Recreation
- Business
- Education
- Electrical Engineering
- Environment
- Earth Sciences
- Philosophy
- 12 more »
- « less
-
shaping at the University of Twente, many applications have arisen, ranging from quantum security to microscopy. The key challenge of wavefront shaping is to find out exactly how to shape the light to form
-
orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
. The core values of the Faculty of Humanities are professionalism, transparency, responsibility, connectedness and safety. These values apply to everyone and we uphold these values in our work and in our
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
scenario, given limited resources? The security situation in the world has changed rapidly since February 2022. Increasing threats also mean a reorientation for Defence: a renewed focus on warfighting, after
-
or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do
-
to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening