Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
: The doctoral candidate will perform computational analysis of a combination of multi-omics data from the gut microbiomes of patients with Alzheimer's disease or Parkinson's disease. The candidate will use state
-
the combined themes of human-computer interaction and critical computing. The lab will be exploring the notion of "deceptive by design" on all fronts: social identity cues in the design of LLM-based chatbots
-
cutting-edge research methods, combining observational studies on primate communication with bespoke probabilistic modeling. The University of Tübingen seeks to raise the number of women in research and
-
, the project implements an approach combining social, institutional, and digital history across three work packages: (i) Communities, (ii) Hierarchies, and (iii) Infrastructures. To operationalize its approach
-
, United States of America [map ] Appl Deadline: (posted 2025/06/24, listed until 2026/06/23) Position Description: Apply Position Description Overview As a Quantitative Research Intern at Susquehanna, you will work
-
, United States of America [map ] Appl Deadline: (posted 2025/06/24, listed until 2026/06/23) Position Description: Apply Position Description Overview As a Quantitative Systematic Trading Intern at Susquehanna, you will work
-
, United States of America [map ] Appl Deadline: (posted 2025/06/24, listed until 2026/06/23) Position Description: Apply Position Description Overview As a Quantitative Systematic Trader at Susquehanna, you’ll combine
-
letter (maximum 2 pages A4), emphasizing your specific interest, qualifications, motivations to apply for this position. A Curriculum Vitae, including a list of all courses attended and grades obtained
-
including a publication list, and names and contact information of up to three references. BACKGROUND CHECKS/CLEARANCES Employment with the University will require successful completion of background check(s
-
security requirements. Taking an interdisciplinary approach, you will combine post-quantum cryptography and cyber security with methodologies from the social sciences to guide system design and evaluation