Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
classes and their roles in scientific applications, such as deep neural networks (DNNs), convolutional neural networks (CNNs), transformer models, and graph-based neural networks. Familiarity with software
-
Mar 2026 - 23:00 (UTC) Country Finland Type of Contract To be defined Job Status Full-time Hours Per Week To be defined Is the job funded through the EU Research Framework Programme? Not funded by a EU
-
, Bae-Net and Web Server applications. Equipment Utilized Mechanical/ electrical equipment, pneumatic calibrating tools, electrical meters, voltage generating transducers, EMS software monitoring and
-
, or discrimination, as defined by the employer. For reference, below are UC’s policies addressing some forms of misconduct: 40% Network Operations Leadership - Prioritizes and sets goals for UCEAP’s network operations
-
merit. Experience of and interest in the analysis of medical images, omics data or other types of health data is considered advantageous. Strong programming and software development skills and familiarity
-
: Expansive knowledge of one of the following operating systems (Apple and Microsoft Windows), as well as PC hardware networking Apple software/hardware and A+ certification preferred or the ability to earn
-
Networks Investigating Security in AI/ML for Mobile Vehicle/Mobile Edge Ethical Hacking Physical-layer Radio Ethical Hacking Security of Software-Defined 5G/6G/Satellite Radio The aim of the research is to
-
Coast Community College District | Huntington Beach, California | United States | about 14 hours ago
District Ally training program, including UndocuAlly (undocumented students), SafeZone (LGBTQ), Vet Net (veterans), and Ability Ally; and other equity minded programs; and a full calendar of culturally
-
comprises 40 libraries located across three university campuses: St.George, Mississauga, and Scarborough. This diverse and extensive network of college libraries, special collections, and specialized
-
-based software. Demonstrated skill at administering moderately complex security controls and configurations to computer hardware, software and networks. Demonstrated understanding of how system management