Sort by
Refine Your Search
-
. The appointment is for one year with the possibility of renewal based on performance and availability of sponsored research funding. Key Responsibilities Lead research projects in embedded systems security under
-
state and federal agencies. The appointment is for one year with the possibility of renewal based on performance. Key Responsibilities Lead research and development of a prototype community readiness
-
the possibility of renewal for a second year. Key Responsibilities Design and conduct field experiments Data curation and analysis Preparation of manuscripts and grant proposals Qualifications PhD in Ecology and
-
. The appointment is for one year with the possibility of renewal based on performance and availability of sponsored research funding. Key Responsibilities Lead research projects in embedded systems security under
-
the PI in the development and submission of new NSF proposals to extend this research. The position is for 1 year with the possibility of renewal for a second year. Key Responsibilities Design and conduct
-
appointment, with annual renewals up to 3 years based on performance. Materials will be reviewed immediately and will continue until positions are filled. Position Type Research Additional Information
-
. The research focus will be on developing and applying first-principles-based and data-driven computational methods to understand multiscale processes and to accelerate chemical discoveries for renewable energy
-
the possibility of renewal based on performance. Key Responsibilities Lead research and development of a prototype community readiness assessment tool to describe the socio-cultural and economic attributes
-
state and federal agencies. The appointment is for one year with the possibility of renewal based on performance. Key Responsibilities Lead research and development of a prototype community readiness
-
of renewal based on performance and availability of sponsored research funding. Key Responsibilities ● Lead research projects in embedded systems security under the supervision of the PI, including