Sort by
Refine Your Search
-
understand, explain and advance society and environment we live in. Your role Conduct research and prepare a doctoral thesis in metabolic network modelling and computational epigenomics Develop novel methods
-
order to better understand, explain and advance society and environment we live in. Your role The PhD student will develop and apply computational multiscale models to investigate brain energy metabolism
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
short-term physiological responses of tree species and modified long-term dynamics of the whole ecosystem. On the other hand, vegetation demography models are numerical tools formulating forest processes
-
acceptability. D2ET will develop a comprehensive digital platform for planning energy transition scenarios, leveraging a consolidated data model and advanced analytics to facilitate strategic decisions with
-
Language Models for Data-to-Text Problems” and involves the study of technical methods and approaches for adapting large language models to tasks mixing text and structured data, such as statistical report
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
personalized immunotherapies for cancer patients with brain metastasis. The TCI group works at the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human
-
the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human samples with state-of-the-art technologies to profile the immune microenvironment of brain
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security