-
study its impact on the degree of collaboration in hybrid teams. The successful candidate will: Develop algorithms to model team performance based on interpersonal (e.g., monitoring, communication) and
-
+ (frontend and backend) to improve usability and experience on multiple devices (laptop, tablets and phones). - to develop and integrate tools for quantitative transcriptomic analysis within YEASTRACT
-
: OBJECTIVES | FUNCTIONS The main objective of this work is to test, extend, and validate the VRRRRoom immersive environment for radiology, and to develop an educational virtual reality software grounded
-
: OBJECTIVES | FUNCTIONS Develop algorithms for pre-processing of spectra, by analysing user-uploaded files to identify their origin, confirm spectra presence, and assess spectrum quality. Implement novel AI
-
. It is mandatory for the approval of the fellowship contract that the selected candidate presents a single copy of the official academic degree certificate, required in education level. In
-
contract that the selected candidate presents a single copy of the official academic degree certificate, required in education level. In the application submission, the candidates from foreign education
-
of the fellowship contract that the selected candidate presents a single copy of the official academic degree certificate, required in education level. In the application submission, the candidates from foreign
-
-0000023 funded by by Recovery and Resilience Plan (RRP) https://recuperarportugal.gov.pt/ and Next Generation EU European Funds, is available under the following conditions: OBJECTIVES | FUNCTIONS Develop
-
the following conditions: OBJECTIVES | FUNCTIONS POSITION 1 | Blockchain Interoperability - signature-based intrusion detection system for blockchain interoperability protocols Develop a signature-based intrusion
-
the following conditions: OBJECTIVES | FUNCTIONS POSITION 1 | Blockchain Interoperability - anomaly-based intrusion detection system for blockchain interoperability protocols Develop an anomaly-based intrusion