Sort by
Refine Your Search
-
bring. Our commitment to fostering an inclusive work environment means we also account for geographic differentials. Your journey with us is about more than just a job; it is about finding the perfect fit
-
skills and the diverse perspectives you bring. Our commitment to fostering an inclusive work environment means we also account for geographic differentials. Your journey with us is about more than just a
-
and technically strong engineers and research pioneering solutions to global challenges. We do this with an unprecedented commitment to integrating across engineering, sciences, arts, business, and
-
appreciate your unique key skills and the diverse perspectives you bring. Our commitment to fostering an inclusive work environment means we also account for geographic differentials. Your journey with us is
-
University’s Robotics Institute is searching for a Postdoctoral Fellow. This is an excellent opportunity for someone who thrives in an interesting and challenging work environment. Job Functions: Collect and
-
EdTech perspective on learning that is currently underrepresented in the global community. Allocate office hours for mentoring edtech fellows. Supervise undergraduate and master student research assistants
-
Robotics Institute is searching for a Postdoctoral Fellow. This is an excellent opportunity for someone who thrives in an interesting and challenging work environment. Job Functions: Research on methods
-
environment means we also account for geographic differentials. Your journey with us is about more than just a job; it is about finding the perfect fit for your professional growth and personal aspirations
-
are being accepted and reviewed on rolling basis. Location Kigali, Rwanda Job Function Pre/Post-Doctoral Associates & Fellows Position Type Postdoctoral Associate / Fellow (Fixed Term) Full Time/Part time
-
of defense, and how those can/should be modified to account for human attacker’s biases. To accomplish this goal, we study attacker’s behavior and create cognitive computational models of the attacker’s