Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
- Medical Sciences
- Economics
- Computer Science
- Business
- Engineering
- Materials Science
- Biology
- Education
- Science
- Humanities
- Psychology
- Social Sciences
- Law
- Arts and Literature
- Mathematics
- Sports and Recreation
- Design
- Chemistry
- Linguistics
- Electrical Engineering
- Earth Sciences
- Environment
- Philosophy
- Physics
- 14 more »
- « less
-
, software testing and verification, software project management, and software maintenance and evolution; as well as emerging areas such as DevOps, software analytics, AI-assisted software engineering, human
-
confidentiality Actively monitor testers while testing, utilizing a variety of technology solutions (cameras, screen capture software, etc.) Intervene after identifying any potential instances of cheating
-
distributed software applications, assists in project delivery, and provides broad support to faculty, staff, researchers, and students. This position assesses client training needs and delivers both support
-
Scheduled Hours 40 Position Summary The Manager EPIC EHR Software Configuration (Beacon / Research / Genomics Applications) is responsible for the strategic configuration, support, and optimization
-
, testing method verifications and quality control. The core laboratory uses multiple information systems including Microsoft Office software programs, instrument specific programs, automation line software
-
Student at University of Mary Washington Additional Considerations: DESIRED -Experience learning new software systems and using data analysis software is a plus. -Familiarity with Canva is a plus Special
-
of equipment. Job Requirements Have relevant competence in the areas of formal methods (including theorem proving and model checking), quantum computing, and software analysis/verification. Have a degree in
-
the appropriate software programs. Adheres to all deadlines established by the SDSU and SJSU College of Graduate Studies to ensure the timely graduation of graduate and doctoral students. Verifies quality and
-
design, software analysis, and software vulnerability detection. Experience in autonomous agent system design in computer security (e.g., vulnerability mining and verification, source code vulnerability
-
presentations; and (c) investigate implementation of the results followed by experimental verification and eventual distribution as open software. As well as the search for new theoretical results, the project