41 parallel-processing-bioinformatics-"Prof" Fellowship positions at University of Oslo
Sort by
Refine Your Search
-
the assessment of the shortlisted applicants in particular. The application deadline is 1 September 2025. The screening and evaluation of candidates will begin immediately. We expect the whole evaluation process
-
Applicants will be assessed on the quality and relevance of the project proposal, their academic grades and their academic experience and personal skills to carry out the project. The hiring process will
-
across Europe. The aim of NorSink is to improve the knowledge base for decision making through six key activities: assimilating rich Norwegian datasets into process-based models novel modelling of forest
-
technology, and ethics. You will be also part of the Digital Signal Processing and Image Analysis (DSB) group in the Department of Informatics at UiO. Francesco Saggio/UiO via Unsplash Francesco Saggio/UiO
-
well as having a strong track record in relation to computational efficiency, which is fundamental in real time processing of streaming data. The main purpose of a postdoctoral fellowship is to provide
-
empirical studies and analyses of rich datasets, and in particular, interaction data, with a focus on examination of collaborative learning processes and practices. The PhD position can be connected
-
security. ITS also hosts the Centre for Space Sensors and Systems (CENSSS), which incorporates operation of an instrument on the NASA Perseverance rover on Mars. A new master program in Space systems is in
-
will be also part of the Digital Signal Processing and Image Analysis (DSB) group in the Department of Informatics at UiO. Francesco Saggio/UiO via Unsplash Francesco Saggio/UiO What skills are important
-
, language technology, and ethics. You will be also part of the Digital Signal Processing and Image Analysis (DSB) group in the Department of Informatics at UiO. Jarli & Jordan/ UiO via Unsplash Jarli & Jordan
-
and further processing should be guaranteed to happen according to some established policy or contract, and it should prevent any other unauthorised access or usage since sensitive data that is