Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
, big data frameworks, bioinformatics, data analysis, data science, discrete and machine learning algorithms, distributed, intelligent, and interactive systems, networks, security, and software and
-
algorithms Improve performance through tuning the GPU code Document, test, and debug revisions of the software for release Coordinate conversion of LM states of cells into coarse-grained atomistic
-
range of areas including but not limited to Artificial Intelligence, Machine Learning, Data Science, Security and Privacy, Parallel and Distributed Computing, Deep Learning, Internet of Things (IoT), and
-
at the department are artificial intelligence, big data frameworks, bioinformatics, data analysis, data science, discrete and machine learning algorithms, distributed, intelligent, and interactive systems, networks
-
geometries and advancing to multimodal damage assessment capabilities. The group conducts cutting edge research and publishes on novel ML breakthrough algorithms for large scale geospatial application
-
algorithms Familiar with the hardware and software environments of high-performance computing systems The ability to perform independent innovative research under minimal supervision, including the design
-
, binding, specificity, stability, and catalytic efficiency of proteins of interest. Data generated will be used to develop large databases for use in the evaluation of protein function prediction algorithms
-
, computers and instrumentation hardware. Ability to install and oversee installation software algorithms for distributed controllers and maintain associated databases. Ability to coordinate maintenance and
-
Required Skills: Current or planned MS or PhD student at the University in CS or related field. Solid background and working knowledge of computer science fundamentals including algorithms, data structures
-
.), distributed computing (cloud computing, microservices, etc.), Dev(Sec)Ops, software engineering (software product lines), human factors in security and privacy, post-quantum and embedded cryptography, and