Sort by
Refine Your Search
-
handled in accordance with all relevant state and federal laws and university policies and procedures regarding its use and disclosure. HERO utilizes computer technology in all aspects of its operations
-
to: computer architecture, hardware design, operating systems, embedded systems, cyber-physical systems, edge computing, machine learning systems, hardware security, and quantum computing. Applicants must have
-
, Excel, and PowerPoint, Team; Ability to learn new computer software and applications, as evidenced by application materials. Contact Information to Applicants Margaret Grove (margaret.grove@ku.edu
-
computer programs including Word, Excel, and PowerPoint, Team; Ability to learn new computer software and applications, as evidenced by application materials. Contact Information to Applicants Margaret Grove
-
utilizes computer technology in all aspects of its operations. The incumbent must become familiar with and be able to use the appropriate computer hardware and software programs associated with this position
-
exposure to using computers and computer programs including Word, Excel, and PowerPoint, Team; Ability to learn new computer software and applications, as evidenced by application materials. Additional
-
exposure to using computers and computer programs including Word, Excel, and PowerPoint, Team; Ability to learn new computer software and applications, as evidenced by application materials. Additional
-
learning and employment opportunities for KU students. This is a creative and dynamic position well suited for student-focused collaborators who are seeking a position that integrates direct student support
-
programming, and information about experiential learning and employment opportunities for KU students. This is a creative and dynamic position well suited for student-focused collaborators who are seeking a
-
; automated proofs; model checking; machine learning; and deep neural networks. Application areas including interdisciplinary usable security and privacy approaches; trustworthy systems; and secure systems