Sort by
Refine Your Search
-
Listed
-
Country
-
Field
- Economics
- Medical Sciences
- Computer Science
- Engineering
- Business
- Materials Science
- Biology
- Education
- Science
- Arts and Literature
- Sports and Recreation
- Humanities
- Law
- Mathematics
- Psychology
- Design
- Social Sciences
- Chemistry
- Linguistics
- Earth Sciences
- Electrical Engineering
- Philosophy
- Environment
- Physics
- Statistics
- 15 more »
- « less
-
associated with the Systems and Software Security research group, but interactions with other relevant research groups (Autonomy and Verification, Formal Methods, Machine Learning and Robotics) are expected
-
assurance, testing, validation, and verification Desirable criteria Familiarity with the application of Generative AI in software engineering Familiarity with sustainability and decarbonisation models and
-
, treatment plans, and post-procedure instructions Maintain and sterilize ophthalmic instruments and equipment Support administrative tasks such as file prep, insurance verification, patient follow-up, and
-
of innovation, and our past achievements inspire our current world changers. In this role, the successful candidate will make a leading contribution to the project “End to End Verification for Constraint
-
We are currently experiencing a system error preventing email verification for new profiles. The vendor will be deploying a patch for this issue on August 1. Programmer Analyst 1 Requisition ID
-
reliable, safe, and secure software systems, carrying out both upstream activities such as requirements quality assurance and architecture analysis, as well as downstream verification & validation activities
-
. Responsibilities Designing software applications and algorithms to support remote sensing, geospatial data analysis, and data science applications. Conducting software testing, code reviews, CI/CD, and verification
-
. Responsibilities Designing software applications and algorithms to support remote sensing, geospatial data analysis, and data science applications. Conducting software testing, code reviews, CI/CD, and verification
-
operating procedures. Administer data entry, storage, and verification processes using both paper and electronic records. Complete case report forms (paper & electronic data capture) and address queries
-
changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is then leveraged in attacks