Sort by
Refine Your Search
-
Listed
-
Country
-
Program
-
Field
-
European Molecular Biology Laboratory (EMBL) , with complementary research expertise at the forefront of molecular medicine research. With the NORPOD program, the Nordic EMBL Partnership aims to foster
-
(independently and in our team) involvement in teaching across different life science study programs at the Faculty of Medicine Required skills: Ph.D. (or comparable) in Bioinformatics, Computational Biology
-
, biochemistry and evolution of the Starship transposons in plant pathogenic fungi. We are seeking creative and ambitious scientists to lead any of the three following research themes: Starship diversity and
-
of the City of Hope Comprehensive Cancer. The Perry laboratory uses structural biology approaches, together with small molecule and fragment-based drug discovery, computer-aided drug discovery
-
Temporary contract | 36 months | Belval Are you passionate about research? So are we! Come and join us The Luxembourg Institute of Science and Technology (LIST) is a Research and Technology
-
an interdisciplinary research team, led by Dr Tom Hiscock, who uses computational and theoretical approaches to understand fundamental questions in developmental biology (see https
-
The SQUASH Program is a prestigious Marie Skłodowska-Curie COFUND initiative offering 3-year postdoctoral positions in quantum science and technology. This 1st international call invites outstanding
-
of Assistant Professor, Associate Professor and Professor. Candidates are expected to have an active, extramurally funded research program in basic/translational cancer research that is complementary to existing
-
seismic gap in the vicinity of the Istanbul urban area. This project is funded by the national funding program Deutsche Forschungsgemeinschaft (DFG) and focuses on the analysis of Distributed Acoustic
-
Computer Science, Artificial Intelligence, Cybersecurity, or related fields Expertise in AI and ML applications for cybersecurity and threat analysis Knowledge of supply chain security challenges and