Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
initiation. To this end, researchers are focusing on the development of new data-driven approaches integrating imaging information and patient physiological characteristics to improve the simulation and
-
, considering the complex morphological and biological evolutive patterns of tumor lesions after immunotherapy initiation. To this end, researchers are focusing on the development of new data-driven approaches
-
on scientific projects submitted by research teams of our institute. Train scientific staff from Institut Pasteur Paris and the international network of Institut Pasteur. Develop tools and applications to be
-
, we take a systemic approach and study the interconnectedness of human activities and the environment. Our mission is to develop sustainable, socially just, and environmentally friendly solutions by
-
techniques have been developed to overcome this drawback. Among them we focus on fluctuation of fluorescent molecules methods as they don’t need any specific materiel or fluorophore. The super-resolved image
-
have a PhD in computer science, mathematics, physics, or related fields, with a passion for programming. A desire to contribute to the development of open-source software within the context of the agreed
-
The recruited engineer will be co-supervised by MdS and Joliot to implement this new approach. To achieve a portable, efficient code that fully exploits GPUs, the core of the code will be developed
-
of teaching and research, the FSTM seeks to generate and disseminate knowledge and train new generations of responsible citizens in order to better understand, explain and advance society and environment we
-
avenues to increase the function of relevant DCs subsets to increase the formation of tissue, resident, long lasting memory T cell responses. This project will be developed in the context of an influenza
-
developed by our team [1,2] are able to: 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security