Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
repositories to which you contributed); your curriculum vitae, including your publications; (a link to your) PhD thesis; the names, telephone numbers, and email addresses of at least two references (these will
-
When computing systems and networks are all you can think of (or at least most of the time) and you are excited to get the best out of a system by constantly fine-tuning it, and want to talk
-
challenge in your career? Information The department of Mathematics and Computer Science is looking for a Management Assistant (approximately 20 hours a week). The tasks involve supporting the Security
-
machine learning, big data analysis and advanced computing; One year of post-PhD relevant experience in research or industry will be an advantage; Experience of working in an international environment will
-
Our group The scientific programmer will be embedded in the Massivizing Computer Systems (MCS) group, which focuses on research in distributed computing systems and ecosystems, and currently spans
-
, as well as expertise in generating hypotheses on molecular mechanisms derived from omics data. Our lab develops technologies that integrate advanced imaging, computational analysis, and single-cell
-
professors and 40 PhD students. We present the history of our planet, and the diversity of life on Earth, through permanent and temporary museum exhibitions, educational programmes, and online presence, with
-
description TU Delft is looking for a Research Software Trainer to support PhD candidates and researchers in developing intermediate-level research software skills. You will design and deliver training in
-
molecular processes diversify during evolution using budding yeast as a model system. They will use a variety of experimental and computational methods. The team will also exist of two PhD students and a Post
-
. Additionally, you will be responsible for initiating, developing, and implementing policies and strategies in the areas of architecture and information security within the organization. You will tackle