Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
responsibilities. The centre includes a broad range of staff ranging from system administrators to user support, training and administrative roles. Read more at https://www.naiss.se, https://www.nsc.liu.se
-
NAISS, the National Academic Infrastructure for Supercomputing in Sweden, provides academic users with high-performance computing resources, storage capacity, and data services. NAISS is hosted by
-
and the national DDLS program. You can read about the workplace here: https://liu.se/en/organisation/liu/ifm https://www.scilifelab.se/data-driven/ https://www.scilifelab.se/units/cryo-em/ https
-
. The research environment is embedded in Linköping University and closely connected to SciLifeLab and the national DDLS program. You can read about the workplace here https://liu.se/en/organisation/liu
-
broad range of staff ranging from system administrators to user support, training and administrative roles. Read more at https://www.naiss.se The employment Permanent position, full-time, 100%. Starting
-
that values scientific curiosity, independence, and teamwork. More information about the division is available at: https://liu.se/organisation/liu/isy/rt . The employment When taking up the post, you will be
-
communication skills in English, both verbally and written, is an absolute necessity. Good inter-personal skills and ability to work in teams but also independently is highly valued. During the AIR2 project
-
ability to communicate in English, both orally and in writing. It is important that you are able to work independently, are goal-oriented, and have strong problem-solving skills. Furthermore you should also
-
We have the power of over 40,000 students and co-workers. Students who provide hope for the future. Co-workers who contribute to Linköping University meeting challenges of today. Our fundamental
-
of LLM agents. These attacks exploit the agent’s ability to store, retrieve, and adapt knowledge over time, leading to biased decisions, manipulation of real-time behavior, security breaches, and system