An­ge­bot 288 von 431 vom 22.06.2018, 00:00


RWTH Aachen - Chair of Software Modelling and Verification

One of the main focuses of the Department of Informatics 2 (Software Modeling and Verification) is the verification of probabilistic programs that enable the implementation of probabilistic models. They extend classical computer programs with probabilistic operations such as the random choice of a value and the observation of program execution. They have a variety of applications such as Bayesian mesh analysis, randomized algorithms and machine learning.

With this call, we are seeking reinforcement for our research team in the recently acquired ERC Advanced Grant "Formal Reasoning about Probabilistic Programs (FRAPPANT)". The aim of this project is the development of formal techniques for the analysis of probabilistic programs based on model checking, deductive verification and static analysis. These are intended to solve difficult problems such as the equivalence and robustness of programs, the synthesis of loop invariants and parameter values, the program correction and the exact Bayesian inference. The developed methods are evaluated in the context of graphical probabilistic models, randomized algorithms and autonomous robots.

We give the opportunity to work internationally in a promising and interdisciplinary field of research. In an excellent university and research environment, there is the possibility of qualification during or after a doctorate. We offer a young, dynamic and committed research team, a pleasant, open working environment as well as very good cooperation opportunities with students, other groups within the RWTH Aachen and internationally renowned research institutions.

Doctorate and Postdoctoral Researchers

Work­ing field:

Rese­arch in the field of veri­fi­ca­tion of pro­ba­bi­li­s­tic pro­grams

  • Par­ti­ci­pa­tion in rese­arch pro­jects of the group and in the acqui­si­tion of third-party funds
  • Deve­lop­ment of soft­ware tools for imple­men­ting ana­ly­sis algo­rithms
  • Pre­pa­ra­tion of sci­en­ti­fic publi­ca­ti­ons
  • Teaching sup­port through con­cep­tion of exer­ci­ses, admi­nis­tra­tive and con­tent accom­pany­ing events.


App­li­cants for a PhD posi­tion have (or soon obtain) a mas­ter degree (or equi­va­lent) in Com­pu­ter Sci­ence, Mathe­ma­tics or rela­ted area and have com­ple­ted their stu­dies with excel­lent gra­des. App­li­cants for a post­doc­to­ral rese­ar­cher posi­tion have in addi­tion com­ple­ted a PhD in one of the afo­re­men­tio­ned areas and have a good publi­ca­tion track record. Can­di­da­tes should have inte­rest in per­for­ming ori­gi­nal, highly com­pe­ti­tive sci­en­ti­fic rese­arch wit­hin a rese­arch group, publis­hing your results in top con­fe­ren­ces and sci­en­ti­fic jour­nals. Flu­ency in Eng­lish is requi­red; pro­fi­ci­ency in Ger­man is hel­pful but not com­pul­sory.

What we of­fer:

The posi­tion is for two years (with a pos­si­ble exten­sion for ano­ther two years) and is to be fil­led by Novem­ber 1, 2018. This is a full-time posi­tion. It is also avail­able as part-time employ­ment per request.

The suc­cess­ful can­di­date has the oppor­tu­nity to pur­sue a doc­to­ral degree.

The salary cor­re­sponds to level EG 13 TV-L.

RWTH Aachen Uni­ver­sity is cer­ti­fied as a "Family-Fri­endly Uni­ver­sity". We par­ti­cu­larly wel­come and encou­rage app­li­ca­ti­ons from women, disa­b­led per­sons and eth­nic mino­rity groups, reco­gni­zing they are under­re­pre­sen­ted across RWTH Aachen Uni­ver­sity. The prin­ci­ples of fair and open com­pe­ti­tion apply and appoint­ments will be made on merit.

How to ap­ply:

For further details, please contact
Prof. Joost-Pieter Katoen
Tel.: +49 (0) 2418021200

For further information, please visit our website at:

Please send your application by June 22, 2018 to
Prof. Dr. Joost-Pieter Katoen
Chair of Software Modelling and Verification
Department of Computer Science
52056 Aachen, Germany

You can also send your application via email to Please note, however, that communication via unencrypted e-mail poses a threat to confidentiality as it is potentially vulnerable to unauthorized access by third parties.