Sort by
Refine Your Search
-
Category
-
Country
-
Field
-
various disciplines: computer scientists, mathematicians, biologists, chemists, engineers, physicists and clinicians from more than 50 countries currently work at the LCSB. We excel because we are truly
-
this recruitment advertisement and position number in your cover letter. Interested candidates should use this online portal to submit their cover letter, CV and contact information for three references. Qualified
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
data Knowledge of statistical methods in the context of biological systems Experience with programming (Python, Perl, C++, R) Well-developed collaborative skills We offer: The successful candidates will
-
As part of the German government's artificial intelligence (AI) strategy, the successful Saxon competence center ScaDS.AI Dresden/Leipzig (Center for Scalable Data Analytics and Artificial
-
The scholarship for the PhD degree is subject to academic approval, and the candidate will be enrolled in one of the general degree programmes at DTU. For information about our enrolment requirements and the
-
the candidate will be enrolled in one of the general degree programmes at DTU. For information about our enrolment requirements and the general planning of the PhD study programme, please see DTU's
-
PhD fellowship/scholarship - Intercropping of cover crops and vegetables to mitigate nitrate leac...
November 2025 or later. You can submit your application via the link under 'how to apply'. Title: Intercropping of cover crops and vegetables to mitigate nitrate leaching and improve soil health in organic
-
can read more about career paths at DTU here . Further information Further information may be obtained from Prof. Stefan Kragh Nielsen, skni@fysik.dtu.dk . You can read more about the section
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular