33 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" positions at Indiana University
Sort by
Refine Your Search
-
visiting IUPD. https://protect.iu.edu/police-safety/annual-reports/index.html ACCOMMODATIONS: If you have a disability and need assistance with an application, special arrangements can be made to accommodate
-
/chiplets/interposer/wafer-scale), quantum, superconducting, machine learning, edge computing, and security/privacy in computer architecture. Digital Logic Design and VLSI – including ASIC/FPGA design for
-
professions. Securing external funding for student support and faculty research is important to the Department and to the School. About the Indiana University Luddy School of Informatics, Computing, and
-
access to an outstanding array of institutional resources, including a robust onboarding program and a high degree of campus engagement and networking. We invite applicants who have high potential
-
to contribute to cutting-edge research investigating the physiological and psychological impacts of spaceflight. Our program focuses on human analog studies to simulate microgravity and explore
-
risk detection Clinical informatics solutions to identify high-risk patients in need of intervention EHR-enabled learning health systems to improve outcomes and quality Trustworthy and safe AI/ML in
-
campuses, is available online. You may also request a physical copy by emailing IU Public Safety at iups@iu.edu or by visiting IUPD. https://protect.iu.edu/police-safety/annual-reports/index.html
-
Posting Details Position Details Title Open Rank, Tenure-Track or Tenured Faculty Positions in Biomedical Engineering, Bioinformatics, and/or Health Informatics Appointment Status Tenure Track
-
, containing policy statements and crime statistics for Indiana University campuses, are available through Public Safety and the IU Police Department web sites at https://protect.iu.edu/police-safety/annual
-
the NSSE Institute to design and deliver campus specific support related to data use. Depending on the candidate’s expertise, this could also include developing and securing external funding, as