Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The candidate will contribute to work on control theory
-
May 2026 - 23:59 (UTC) Country France Type of Contract Temporary Job Status Full-time Hours Per Week 35 Offer Starting Date 1 Sep 2026 Is the job funded through the EU Research Framework Programme? Not
-
Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The position will involve working on an ANR project in close collaboration
-
Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The BISE team (Isotopic and Experimental Biogeochemistry) at the Institut
-
The postdoctoral researcher will join the "Network Dynamics & Computations" team led by Srdjan Ostojic and develop research projects on modeling neural circuits and their role in behavior. The work will focus
-
Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The recruited researcher will conduct research in the field of nonlinear
-
motivated postdoctoral researcher to develop and apply imaging-based and computational approaches to identify predictive nuclear signatures of cell fate. The project combines experimental and quantitative
-
4 Apr 2026 Job Information Organisation/Company CNRS Department Laboratoire d'Analyse et de Modélisation de Systèmes pour l'Aide à la Décision Research Field Computer science Mathematics
-
funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description As part of this postdoctoral position, you will have the opportunity to contribute
-
of this postdoctoral position is to enable the formal verification of security protocols involving non-negligible probabilities. Formal methods have proven their value in the design and analysis of security protocols