63 web-programmer-developer-"INSERM" Postdoctoral positions at University College Cork
Sort by
Refine Your Search
-
Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description 23 Months, Fixed-Term, Whole-time Post Position Summary The role
-
Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description 18 Months, Fixed-Term, Whole-Time Post Position Summary The School of Law
-
Information Technology, to conduct research on the development of explainable work rotas using constraint programming and other AI technologies. Prior experience in developing software solutions to scheduling
-
focused group of researchers led by Dr Jimmy Murphy, who researches ORE industry needs from technology development to logistics and LCOE modelling. It is a dynamic team that meets the challenges of the ORE
-
mitigation, adaptation and other ecosystem services to underpin policy development. This post-doctoral position will contribute specifically to the development of long-term management strategies for Blue
-
from Mountains to Coast) which aims to development a comprehensive Restoration Action Plan for the Danube River basin, co-created with stakeholders, that will promote the improvement of ecological status
-
. Working in close collaboration with Cork City Council, the post-doctoral researcher will develop, implement and evaluate Nature Based Solutions locally and across the project pilot sites. Achievement
-
6 Months, Fixed Term Full-Time Post Position Summary We are seeking to recruit a Post Doctoral Researcher to work on the HyFloat1 Project. The HyFloat1 Project is developing a novel floating
-
-funded consortium, OptiViVax, where they will focus on developing microneedle skin patches to deliver next generation malaria vaccines based on newly identified antigens and newly licensed adjuvants
-
forums. The research will examine potential privacy breaches, including de-anonymisation attacks, and develop countermeasures using techniques such as differential privacy and cryptographic protocols