Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
the Global South is a strong advantage. - Good knowledge of statistical methods and relevant software packages (e.g. R, Python). We also encourage candidates who do not meet every single requirement but
-
English fluently (proficiency in other EU official languages will be considered an asset); You have experience in quantitative analysis, network analysis and familiarity with computational methods is a plus
-
engineering methods, cost-benefit analysis and cost-effectiveness analysis are considered as a plus. What we offer We offer a full-time contract for a period of 1 year, which can be extended with 1 year (after
-
method, can engineer thousands of defined mutations in parallel in a single test tube in yeast. Strains are tagged by DNA barcodes, allowing to efficiently track mutations in cell populations during
-
method, can engineer thousands of defined mutations in parallel in a single test tube in yeast. Strains are tagged by DNA barcodes, allowing to efficiently track mutations in cell populations during
-
Analyze and assess risks of de-anonymization, including researching current de-anonymization strategies Investigate synthetic data generation methods and their utility Deploying and benchmarking the above
-
of photocatalysis and you know how to characterize these photocatalysts by advanced electrochemical and spectrometric methods. You have published in international journals on these topics and/or you have attended
-
, mainly to enable faster and more reliable measurements with this method. You will present your research in high-quality international scientific journal publications and conferences. You support other
-
mindset of using motors to drive passive structural components by developing innovative materials that combine the structural features and mobility in a single component. These are liquid crystal elastomers
-
to develop innovative methods and actionable tools for detecting, analyzing, and preventing vulnerabilities in supply chain systems, leveraging state-of-the-art AI and ML techniques to improve overall security