40 web-developer "https:" "https:" "https:" "Newcastle University" positions at KTH Royal Institute of Technology
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
documents, please provide a summary (abstract) and a web link to the full text. Applications must be received at the last closing date at midnight, CET/CEST (Central European Time/Central European Summer Time
-
seeking a PhD student to apply antibody-based, multiplexed imaging tools to develop spatiotemporal protein maps of human cells and tissues, within the framework of the Human Protein Atlas (HPA). The project
-
, and introduce novel functionalities, such as sensing, in PICs. See https://symphonyproject.eu/ for more information. The experimental work will be conducted in the KTH micro- and nano-fabrication
-
Science invites applications for one doctoral student position in the area of formal modelling for trustworthy AI The goal of the project is to develop a model-based integrated framework that supports
-
. Our research focuses on advancing next-generation spatial intelligence technologies for complex built environments and developing intelligent solutions to support a smart, sustainable, and resilient
-
summary (abstract) and a web link to the full text. Applications must be received at the last closing date at midnight, CET/CEST (Central European Time/Central European Summer Time). Other information
-
long) Representative publications or technical reports. For longer documents, please provide a summary (abstract) and a web link to the full text. Applications must be received at the last closing date
-
or technical reports. For longer documents, please provide a summary (abstract) and a web link to the full text. Applications must be received at the last closing date at midnight, CET/CEST (Central European
-
electrocatalytic reactions, with a primary focus on the conversion of biomass-derived feedstocks into value-added chemicals. For further details of our approach look at: KTH | Paula Sebastián Pascua l and https
-
the development of structured models to represent attacks and their properties, including measures of attack quality such as time required, risk of detection, resource requirements, and consequences. These models