Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
postdoc positions. INTEGREAT develops theories, methods, models and algorithms that integrate general and domain-specific knowledge with data, extending the data-centric paradigm of ML. Applicants
-
will have to undergo a check versus national export, sanctions and security regulations. Candidates may be excluded based on these checks. Primary checkpoints are the Export Control regulation
-
on these checks. Primary checkpoints are the Export Control regulation, the Sanctions regulation, and the national security regulation. What are we looking for in you? Personal skills: We are looking for a highly
-
based on these checks. Primary checkpoints are the Export Control regulation, the Sanctions regulation, and the national security regulation. Personal skills Ability to work both independently and as part
-
checkpoints are the Export Control regulation, the Sanctions regulation, and the national security regulation. Colourbox via Unsplash Colourbox Personal skills Ability to work both independently and as part of
-
psychiatry on longitudinal multimodal data, to fit and validate prediction models. Perform quality control and imputation of genotype data from relevant datasets, including international and Norwegian samples
-
. Candidates may be excluded based on these checks. Primary checkpoints are the Export Control regulation, the Sanctions regulation, and the national security regulation. What are we looking for in you? Personal
-
international e-infrastructure projects associated with ELIXIR Norway. One central project focuses on secure archiving and controlled access to human genome datasets and related information in a federated
-
will have to undergo a check versus national export, sanctions and security regulations. Candidates may be excluded based on these checks. Primary checkpoints are the Export Control regulation
-
staff to ensure proficiency in the use of laboratory equipment and methods. Assist with developing, updating, and communicating guidelines for best practices to users, data access control, and monitoring