46 proof-checking-postdoc-computerscience Postdoctoral positions at Delft University of Technology (TU Delft)
Sort by
Refine Your Search
-
critical materials data, refine degradation models, and design mitigation strategies that support the safe and sustainable operation of research reactors across Europe. As a postdoc researcher at TU Delft
-
Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description Join TU Delft as a postdoc on the CHESS project to model, design
-
motivated Postdoctoral Researcher to join the group of Dr. Viatcheslav Dobrovitski to do the research on the dephasing of entangled states of spin and photonic qubits in quantum networks. The postdoc will
-
unsolicited services. Where to apply Website https://www.academictransfer.com/en/jobs/356257/postdoc-mammalian-cell-engineer… Requirements Additional Information Website for additional job details https
-
Website https://www.academictransfer.com/en/jobs/355106/postdoc-life-marker-chip-surfac… Requirements Additional Information Website for additional job details https://www.academictransfer.com/355106/ Work
-
Guidelines . We carry out this check on the basis of legitimate interest. Please do not contact us for unsolicited services. Where to apply Website https://www.academictransfer.com/en/jobs/354801/postdoc
-
and/or post. A pre-employment screening can be part of the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on
-
demonstrated in real-world case studies, ensuring that research outcomes directly inform both long-term planning and short-term emergency response. As a Postdoc in our team, you will work at the intersection
-
to DRI on a fundamental level is critical. As a postdoc in Steelmaking Process Kinetics, you will: Explore experimental techniques to replicate and quantify DRI melting, heat transfer and DRI-slag
-
security check will be part of the application procedure. For more information on this check, please consult Chapter 8 of the National Knowledge Security Guidelines . We carry out this check on the basis