70 distributed-algorithm-"Meta"-"Meta"-"Meta" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
in the following areas: · AI/ML Algorithm Attack Research: Study threat models targeting AI/ML algorithms, identify weak points, and design novel ways to subvert AI/ML systems. · AI/ML
-
Extension Divisions. Administering HR functions for both the Music Extension Division and Music Prep School, including creating and distributing annual contracts to faculty, hiring and onboarding student
-
Responsibilities: Assist in research and development of computer vision-based tools and prototypes. Implement and test algorithms using OpenCV and related libraries. Design and iterate on intuitive and efficient
-
, collection, distribution, and archiving. Work with ASC team to provide course scheduling support by using department and university systems to schedule various course meetings (e.g. open lab sessions, grading
-
for someone who thrives in an interesting and challenging work environment. Core responsibilities include: Developing mathematical models and optimization algorithms for problems arising in ship and vehicle
-
for someone who thrives in an interesting and challenging work environment. Core responsibilities include: Developing mathematical models and optimization algorithms for problems arising in ship and vehicle
-
on developing innovative algorithms and models to address complex problems in diverse fields such as robotics, healthcare, and finance. The department offers a range of undergraduate and graduate programs
-
environment. In this role you will perform various material handling functions to receive, store, select, distribute, inspect, and reconcile all incoming and outgoing packages, and prepare packages to be
-
environment. In this role you will perform various material handling functions to receive, store, select, distribute, inspect, and reconcile all incoming and outgoing packages, and prepare packages to be
-
Theoretic algorithms of defense, and how those can/should be modified to account for human attacker’s biases. To accomplish this goal, we study attacker’s behavior and create cognitive computational models