Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
' program goals and are compliant with the project's authorization criteria, Mason's HECO manual, Campus Master Plan, and Design Guidelines and Construction Standards; Ensures that design submittal, review
-
needs in our region and beyond. The position will establish an extramurally funded research program whose results are published in the peer-reviewed literature, and to provide mentorship to graduate and
-
of failure or malfunction by observation and testing of mechanical, electrical, pneumatic components, and application-specific computer programs; Maintains cooling towers, hot water and chilled water piping
-
with education and experience Criminal Background Check: Yes About the Department: The College of Science is committed to enhancing the college's strength in theoretical, experimental, and computational
-
University. The mission of the Center for Collision Safety and Analysis is to advance collision safety though scientific research using sophisticated computational methods that provide a means to establish a
-
by serving as George Mason University's facility, program, and support services management department for the Johnson Center, Student Union Building I, and The Hub. The department aims to support and
-
China 1-2-1, Mason Korea, and other international partnerships; and Provides timely referrals to the Associate Chair, and the Economics Undergraduate Program Coordinator. Additional referrals may include
-
obligations. Facilitates A/E dispute resolution. Programming/Design Phase Manages programming and design of assigned capital projects to ensure that A/E design submittals maximize the users' program goals and
-
Department: Col of Engineering and Computing Classification: 9-month Instructional Faculty Job Category: Instructional Faculty Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between