Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
per annum paid towards your course fees. Applications No application required Total scholarship value Up to $12,000 Number offered Varies (Depending on funding) See details Bachelor of Computer Science
-
value $21,500 Number offered Varies (Depend on funding) See details Bachelor of Computer Science Moksh Receiving a scholarship has been my motivation to study harder. It has also given me more confidence
-
an understanding of how students make use of the received feedback or the #sustainability of such feedback practice. As technology-mediated feedback becomes an integral part of learning, there is growing urgency in
-
on this technology for its automated warehouses and fulfilment centres. The aim of this project is to use discrete optimisation techniques (e.g. Integer Programming) to design new algorithms for MAPF. An example
-
Contemporary filmmakers and visual artists alike are embracing the potential of immersive digital technology – such as Augmented and Virtual Reality – to tell stories in powerful, new and affective
-
Antimicrobial resistance (AMR) is one of the most significant and immediate threats to health in Australia and globally. We are working on harnessing new technologies such as artificial intelligence and next-generation sequencing and to improve the diagnosis, treatment and prevention of AMR...
-
today will no longer provide security in the presence of such technology. Therefore, cryptography based on “Post-Quantum” (PQ) techniques (that resists attacks by quantum computers) is a central goal for
-
, Authorship and Intention in Computer Generated Art. In: Ekárt A., Liapis A., Castro Pena M. (eds) Computational Intelligence in Music, Sound, Art and Design. EvoMUSART 2019. Lecture Notes in Computer Science
-
Master of Commerce Scholarship Sir John Monash Fee Scholarship The Master of Commerce is a research-oriented programme preparing students for a PhD and an academic career. Offered as part of
-
this goal, we expect to deeply and comprehensively explore the following directions: 1) Investigate privacy-enhancing techniques (e.g., differential privacy and/or secure multi-party computation) and design