Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
, we consistently rank among the top engineering programs by US News and World Report. The Civil and Environmental Engineering Department at Carnegie Mellon is looking for a researcher that will model
-
, we consistently rank among the top engineering programs by US News and World Report. The Civil and Environmental Engineering Department at Carnegie Mellon is looking for a researcher that will model
-
learning, medical imaging, weather modeling, cell biology, and genomics. PSC is seeking creative and capable individuals to join our highly experienced Advanced Systems and Operations team as our new Cyber
-
%) Leverage financial, analytical, and reporting tools to produce timely reports supporting internal controls, external and federal audits, and depreciation analysis within the F&A cost model. Analyze capital
-
The ability to develop the business model for sustainable leadership-class computing and manage a complex budget comprising multiple funding sources and time horizons and comprising capital and operating
-
computational modeling, fabrication, and preclinical testing. The program culminates in the in vivo validation of bioprinted liver constructs in rodent and porcine models, including IND-enabling studies
-
Include: Design and implementation of computational cognitive models Capture workflows and strategies in complex software engineering systems in their integration in real-time recommender systems Carry out
-
group in the Materials Science and Engineering Department in the College of Engineering. The position will focus on experiments and modeling related to liquid formulations for organic coatings. Core
-
the Grammy-Award-winning Pittsburgh Symphony), and 13 administrative and technical staff, Carnegie Mellon’s School of Music blends the one-on-one conservatory model of musical mentorship with the resources and
-
robustness of defenses and mitigations for AI systems, reverse engineering AI systems and models, and identifying new areas where security research is needed. We participate in communities of network defenders