Vacatures 91 tot 100 van 171
ads
- Volledige vacature bekijken
- Volledige vacature bekijken
- Volledige vacature bekijken
Loyall ICT Services via ICT Group - Deventer
In het kortAls embedded software designer ben je verantwoordelijk voor het vertalen van eisen naar module ontwerpen en code. Deze software heeft als doel om hardware en mechanische componenten aan te sturen. Je werkt nauw- Volledige vacature bekijken
ICT Group - Eindhoven
In het kortAls embedded software architect zorg je ervoor dat de wensen en eisen van de klant door creativiteit vertaald worden in een solide software architectuur. Deze wordt onder jouw technische leiding in ontwikkelteams- Volledige vacature bekijken
Loyall ICT Services via ICT Group - Deventer
In het kortAls embedded software architect zorg je ervoor dat de wensen en eisen van de klant door creativiteit vertaald worden in een solide software architectuur. Deze wordt onder jouw technische leiding in ontwikkelteams- Volledige vacature bekijken
Locatie via Academic Positions
international conferences. Your qualifications as an Ingenious Partner: Completed technical studies (at least MSc.) related to computer science (e.g., technical computer science, software engineering, embedded systems, data54 dagen geleden - Preview - Opslaan
Post-Doctoral Research Visit F/M Model placement in ...
Locatie via Academic Positions
dynamicity of the network, e.g., due to users’ request process or changes in available computing and communication resources. We will also consider other metrics, such as energy consumption, in the objective functions and31 dagen geleden - Preview - Opslaan
Postdoc on Causal Machine Learning for Spatio
Universiteit Leiden via Jobsonline - Leiden
successful applicant will be embedded in the and the research groups and collaborate with researchers at the Natural Computing (NACO) and the Explanatory Data Analysis (EDA) Research Groups. Moreover, there are plenty of opportunities- Preview - Opslaan
PhD in Computational Modelling of Root-Mycorhizza in...
Locatie via Academic Positions - Esch
energetic state of brain cells, an agent-based physiological 3D model of mitochondria based on the seminal work of Prof. Skupin ( ) will be extended and embedded into a continuous description of single-cell models for neurons and- Preview - Opslaan
Software Engineer Quantum Networks Research
Tudelft via Security Talent - Delft
which privacy is guaranteed by the laws of physics. Also, quantum processors can be connected into a quantum network in order to assemble a large quantum computing cluster. This approach is called networked quantum computing - Preview - Opslaan
Topic - Arnhem
Engineering, Embedded Systems, Physics and/or Mathematics; Minimum of 4 years of experience in software development for the high-tech domain on platforms like Linux and Windows. Expertise in Python and C++ programming- Preview - Opslaan
The Talent Recruiters - Utrecht
responsibilities as you grow in seniority and jobgrade. Job requirements: You have a Masters or Bachelor’s degree in Embedded Systems, (applied) Computer Science, Computer Engineering, Electrical Engineering, Physics and- Preview - Opslaan
Postdoc on Causal Machine Learning for Spatio
Universiteit Leiden 739694 via Magnet.me - Leiden
NWO) through the Aspasia premium awarded to dr. Mitra Baratchi for her research on machine learning for spatio-temporal data. The successful applicant will be embedded in the Spatio-temporal data Analysis and Reasoning (STAR- Opslaan
System Test Engineer Military Communication Solutions
Het Customer and Technical Support Team is via Uitzendbureau
beheersing van het Arabisch is een pluspunt. Bereid is om te reizen indien nodig. Ervaring heeft met training en een sterke achtergrond heeft in testen en integratie. Kennis heeft van embedded systemen, netwerken en45 dagen geleden - Preview - Opslaan
Assistant Professor in Advanced Computer Systems and...
Universiteit Leiden via Security Talent - Leiden
high performance and efficient computing systems, networks and storage, as well as embedded and real-time computing systems, and the necessary (cyber) security methods and techniques to protect such systems. The complexity of- Preview - Opslaan