Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Graduate Certificate. The department also offers minors in Computer Science, Cybersecurity, Information Assurance and Security, Machine Learning, and Mobile App Development. The College of Science and
-
of power and propulsion systems, heat and mass transfer, thermo-fluid systems simulation and programming, as well as exposure to software platforms and algorithms for Artificial Intelligence, Machine
-
the research activities of the team: SOTERN and of the laboratory IRISA and the department SRCD. The scientific activities of this department are related to Network Systems, Cyber Security and Digital Law. The
-
University of North Carolina at Chapel Hill | Chapel Hill, North Carolina | United States | about 1 hour ago
Carolina, within a reasonable commuting distance of their assigned duty station. The Information Security Office coordinates the institution’s response to cyber risk, operates critical organization-wide
-
Computer Science, Electrical/Electronics Engineering, Data Science, Cyber-Physical Systems, or a closely related discipline. Machine Learning & Data Processing: You have solid experience developing and applying
-
Computer Engineering program and develop and maintain a nationally and internationally recognized externally funded research program in their technical fields. Teach and mentor students at both
-
are available at http://ist.gmu.edu/students/current-students/course-syllabi/) : Graduate Big Data Analytics Natural Language Processing Machine Learning Data Mining Cybersecurity Cyber-Human Systems Artificial
-
Research Excellence in Cyber-Physical Infrastructure Systems (MECIS), and the University Transportation Center for Railway Safety (UTCRS). For further information regarding the College, please visit our
-
includes, but is not limited to: photonic data processing and communication systems; AI-driven optical signal processing and network optimisation; machine learning for photonic systems modelling, control
-
of department computing assets, including process of requisitions. A successful candidate will be self-motivated, interested in learning and troubleshooting; a team player, hands on and creative; and have the