Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
understand, explain and advance society and environment we live in. Your role Conduct research and prepare a doctoral thesis in metabolic network modelling and computational epigenomics Develop novel methods
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
: •clean-room fabrication of resonator structures, •ferroelectric and piezoelectric characterization, •resonators testing using Vector Network Analyzer (VNA). Is Your profile described below? Are you our
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
The SIGCOM research group, headed by Prof. Symeon CHATZINOTAS, carries out research activities in the telecommunication and networking systems, including NTNs and quantum communication
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
of improved workflows in field studies These tasks will be carried out within the Marie Skłodowska-Curie Doctoral network METAMIC 3 - Metaproteome-based leveraged microbiome management in the context of One
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security