Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- University of Oslo
- KU LEUVEN
- Queensland University of Technology
- University of Nottingham
- Linköping University
- Nature Careers
- Technical University of Munich
- Ariel University
- CNRS
- CSIC
- Institute of Biochemistry of the Romanian Academy
- Slovak University of Agriculture in Nitra
- Swedish University of Agricultural Sciences
- University of Texas at Austin
- Łukasiewicz PORT
- ;
- Aalborg Universitet
- Aalborg University
- Carnegie Mellon University
- Centre for Synthesis & Chemical Biology, University College Dublin
- Delft University of Technology (TU Delft)
- ETH Zürich
- Eindhoven University of Technology (TU/e)
- European Magnetism Association EMA
- Gottfried Wilhelm Leibniz Universität Hannover
- Grenoble INP - Institute of Engineering
- Inria, the French national research institute for the digital sciences
- Istituto Italiano di Tecnologia
- Itä-Suomen yliopisto
- KNAW
- King's College London
- Lulea University of Technology
- Max Planck Institute for the Physics of Complex Systems •
- Max Planck Institute for the Study of Crime, Security and Law, Freiburg
- Middlesex University;
- Monash University
- NTNU - Norwegian University of Science and Technology
- NTNU Norwegian University of Science and Technology
- Norwegian University of Life Sciences (NMBU)
- RMIT UNIVERSITY
- RMIT University
- SciLifeLab
- Sorbonne University, IMPMC-UMR 7590
- Swansea University
- TU Wien
- Technical University of Denmark
- The University of Iowa
- Tilburg University
- UTTOP
- Umeå University
- Universidade do Minho
- Universite de Montpellier
- University for Continuing Education Krems
- University of Amsterdam (UvA)
- University of Basel
- University of Birmingham
- University of Copenhagen
- University of Dublin, Trinity College
- University of Exeter
- University of Exeter;
- University of Galway
- University of Minho
- University of Pisa
- University of Plymouth
- University of South Bohemia
- University of Southern Denmark
- University of Twente
- University of Twente (UT)
- University of Warwick
- Université côte d'azur
- Université de Poitiers
- Utrecht University
- Wageningen University & Research
- 63 more »
- « less
-
Field
-
. Preferred Qualifications Hands-on experience in analyzing and manipulating seismological/geophysical data. Proficiency with specific background and hands-on experience with deformation assessment and
-
for locomotion and manipulation in confined spaces. The successful candidate will be based at the Rolls-Royce University Technology Centre (UTC) in Manufacturing and On-Wing Technology at the University
-
al. Molecular Biology of the Cell, 4th edition. New York: Garland Science; 2002. Chapter 3: Proteins Chapter 8: Manipulating Proteins, DNA, and RNA Chapter 10: Membrane Structure Westermeier R., Naven
-
York: Garland Science; 2002. Chapter 3: Proteins Chapter 8: Manipulating Proteins, DNA, and RNA Westermeier R., Naven T., Hopker H.-R. Proteomics in Practice. A Guide to Successful Experimental Design
-
is a subarea of technologies involving the manipulation of cells, tissues, organs, or the entire body, the opening of this call comes under the Projet "A Mechanotransductive Approach to Development
-
, sub area of Biotechnology Applied to Health and Technologies involving the Manipulation of Cells, Tissues, Organs or the Whole Organism, the opening of this call comes under the Projet "Advanced Therapy
-
Key takeaways Minimally invasive interventions increasingly require tools capable of sensing, actuation, and manipulation at sub-millimetre scales. Micro-robotic systems enable highly miniaturized
-
-from-disorder. Controlling these offers a way to manipulate and study such exotic systems. The successful candidate will realize this control experimentally in carefully selected prototypical magnetic
-
doctoral school; The candidate will be involved in a project aimed at exploring the molecular underpinnings of HIV antisense transcripts linked to its latency. This will involve manipulating barcoded
-
of LLM agents. These attacks exploit the agent’s ability to store, retrieve, and adapt knowledge over time, leading to biased decisions, manipulation of real-time behavior, security breaches, and system