Researchers develop a camera with spatially selective focusing, allowing the lens to focus on objects at many different distances at once.
I work in four broad areas: Speech recognition, Audio processing, Neural networks and Privacy/Security for voice processing. In audio processing, I work on noise ...
Majd F. Sakr is a Teaching Professor in the Computer Science Department within the School of Computer Science at Carnegie Mellon University. He is also the co-director of the Master of Computational ...
The Department of Electrical and Computer Engineering (ECE) at Carnegie Mellon University is accepting applications from candidates for tenure-, research-, and teaching-track positions at all ranks on ...
A lifelong connection. ECE's Office of Engagement provides opportunities for our 10,000-plus alumni to deepen their relationship with each other, the department, and current students. Inspiring and ...
Ten Carnegie Mellon doctoral students pursuing artificial intelligence research will receive support from Amazon through the company’s new AI Ph.D. Fellowship Program. The students come from across ...
Burcu Akinci, head of the Department of Civil and Environmental Engineering (CEE), has been appointed as the next dean of the College of Engineering at Carnegie Mellon University, effective January 1, ...
What are the deadlines for the fall and spring admission processes? Please refer to the Graduate Application Admissions Deadlines. How can I check my application status? Due to the large number of ...
Richard M. Stern received the S.B. degree from the Massachusetts Institute of Technology in 1970, the M.S. from the University of California, Berkeley, in 1972, and the Ph.D. from MIT in 1977, all in ...
My research deals with understanding the interaction of light with materials, devising theories and imaging architectures to capture these interactions, and finally developing a deeper understanding ...
The following courses are listed by area and are available to fulfill the PhD Breadth Requirements.
In a world where data breaches and cyberattacks are ever-present, the need for technologists who have a solid understanding of the principles that underlie strong ...