Sort by
Refine Your Search
-
at the interface of data science and the scientific domains pursued at the three participating Helmholtz centers. Methodologically, a broad range of topics is covered, from large-scale data management to data mining
-
, Computer Science, Artificial Intelligence, Theoretical Computer Science, Computer Engineering, Practical Computer Science Description Description The CISPA Helmholtz Center for Information Security is
-
, Computer Science, Artificial Intelligence, Theoretical Computer Science, Computer Engineering, Practical Computer Science Description Description The CISPA Helmholtz Center for Information Security is
-
-ethnic environment with sensitivity and respect for diversity Desirable: Experience in cheminformatics, molecular modeling, or enzyme mechanisms Familiarity with databases, data mining, and knowledge
-
geriatric care in the Strukturwandelregion (former coal-mining region) of Saxony-Anhalt. The successful candidate will observe, follow, and engage various stakeholders (tech companies, care workers, local
-
biochemical techniques to study details of antigen recognition and effector functions of autoantibodies Engage in data analysis and collaborate with computational scientists. Your qualifications: MSc
-
the successful applicants the opportunity to obtain a doctoral degree. The position is suitable for part-time employment. For further information, you can contact Prof. Dr. Wolfram Bauer e-mail: bauer@math.uni
-
of the university using this link: http://obp.uni-goettingen.de/de-de/OBF/Index/75968 . For more information get in touch with Linda Haber directly via E-Mail: linda.haber@mathematik.uni-goettingen.de, Tel. +49 551
-
during downstream processing. Theoretical investigation of molecule stability during DSP, using molecular interaction simulations such as e.g. Molecular dynamics (MD). Combination of PAT and data driven
-
less than eight semesters, three references are required; please use the official DAAD template [doc-Datei] and ask your professors to email the confidential document to the GSPoL. Step 2: personal