Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
ability to communicate in English, both orally and in writing. It is important that you are able to work independently, are goal-oriented, and have strong problem-solving skills. Furthermore you should also
-
, design, and conduct cutting-edge research on power-efficient integrated circuits (ICs) and transceivers tailored for next-generation 6G systems. To ensure seamless integration, these front-end solutions
-
, mechanical engineering, or a similar field. Experience in power systems, logistics systems and vehicle modeling, as well as physical modeling and optimization, is considered meritorious. You should be clear in
-
at bachelor’s and master’s level. Of particular merit for the position are the following: Ability to develop and coordinate courses in technical subjects related to embedded systems and cybersecurity. Experience
-
responsibilities. The centre includes a broad range of staff ranging from system administrators to user support, training and administrative roles. Read more at https://www.naiss.se, https://www.nsc.liu.se
-
NAISS, the National Academic Infrastructure for Supercomputing in Sweden, provides academic users with high-performance computing resources, storage capacity, and data services. NAISS is hosted by
-
and the national DDLS program. You can read about the workplace here: https://liu.se/en/organisation/liu/ifm https://www.scilifelab.se/data-driven/ https://www.scilifelab.se/units/cryo-em/ https
-
. The research environment is embedded in Linköping University and closely connected to SciLifeLab and the national DDLS program. You can read about the workplace here https://liu.se/en/organisation/liu
-
broad range of staff ranging from system administrators to user support, training and administrative roles. Read more at https://www.naiss.se The employment Permanent position, full-time, 100%. Starting
-
of LLM agents. These attacks exploit the agent’s ability to store, retrieve, and adapt knowledge over time, leading to biased decisions, manipulation of real-time behavior, security breaches, and system