125 coding-"https:"-"Prof"-"FEMTO-ST" "https:" "https:" "https:" "https:" "https:" "UNIV" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
; comfortable developing production‑grade code and APIs. Solid understanding of ML theory, statistical learning, and common algorithms. Hands‑on experience with TensorFlow, PyTorch, Torch, Caffe, or similar deep
-
systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors, oversight
-
software-intensive systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors
-
datasets. Collaborate with team members to debug models, analyze results, and iterate on research directions through regular code reviews and research discussions. Document research findings through clear
-
research or engineering activities for publication. You have a reputation for the highest level of research and engineering integrity. You have demonstrated contributions and have published research, code
-
or develop applications or systems programs from detailed specifications. Code, test, and debug programs. Develop and maintain technical documentation. Flexibility, excellence, and passion are vital qualities
-
systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors, oversight
-
AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and
-
bullying policy throughout the Pre-College community. Ensuring that the shared vision, values, and code of conduct of Pre-College Programs is upheld throughout the housing communities and among students and
-
AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and