Sort by
Refine Your Search
-
learning theory, evidence-based Instructional Design models & educational pedagogy, and innovative pedagogical best-practices. Demonstrated experience working with curriculum, assessment, and measurable
-
to advanced-level functions. Use text editing system to produce publication and other materials; input coded commands and format text including scientific and mathematical symbols; create templates using
-
Intro about Dept./Unit/Program Interactive Media Arts (IMA) is an academic community of artists, thinkers, and makers dedicated to cultivating cutting-edge theory and practice within the field
-
solutions to problems. Knowledge of standard office software (Google Apps, Microsoft, etc). Preferred Skills, Knowledge and Abilities: Experience with civic engagement and leadership programs and theories
-
perspectives, including theory, history, and specific topics or events. About NYU and NYU Washington, DC: Founded in 1831, New York University is the largest private university in the United States. The
-
factors such as (but not limited to) the specific grant funding and the terms of the research grant when extending an offer. Required Qualifications: Completion of a PhD in physics, mathematics
-
at the intersection of control theory and machine intelligence. Methodologies of interest include: Robot modelling, Nonlinear and Optimal control, Reinforcement learning, and Data-driven modeling and control. The Post
-
interdisciplinary, drawing upon tools from population genetics, molecular evolution, computational biology, ecological and evolutionary theory, field biology and chemistry to understand how ecological interactions
-
, real robot experiments and the mathematical theor Salary Requirements: In compliance with NYC?s Pay Transparency Act, the annual base salary for this position is $75,000. Candidates should have a PhD in
-
and Compliance processes and required supporting artifacts. Understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques, and attack vectors