Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
ideas - and the people who discover them The Opportunity The Department of Data Science and Artificial Intelligence at Monash University is looking for a Lecturer or Senior Lecturer to contribute to our
-
the Monash Engineering program. Am I eligible? You must be one of the following: An International student You must meet the following criteria: A commencing student enrolled or intending to enrol in
-
operators for these notions. Over the past fifty years, such non-classical logics have proved vital in computer science and logic-based artificial intelligence: after all, any intelligent agent must be able
-
the learner’s limited capacity to engage with feedback productively, a skill known as feedback literacy. Current approaches to studying learners’ engagement with feedback have relied heavily on self
-
healthcare, finance, environmental monitoring, and beyond. While recent advancements in foundation models have shown tremendous success in NLP and computer vision, the unique characteristics of time series
-
Candidates should hold a previous degree (Bachelor’s and/or Master’s) in Computer Science, Data Science, Robotics, Mechatronics, or Software Engineering, with demonstrated knowledge in machine
-
well as giving back to the community through the education faculty peer mentoring program. I do not take for granted the opportunities that I have been able to pursue thanks to the increased financial stability my
-
We have several PhD and Research Assistant (RA) opportunities available in areas such as Multimodal Large Language Models (MLLM) for human understanding, MLLM safety, and Generative AI. If you have published in top-tier conferences (e.g., CVPR, ICCV, ECCV, NeurIPS, etc.), you will have a strong...
-
of Women’s Health program outcomes through a range of laboratory and technical activities, including sample preparation, cell and tissue culture and performing assays such as qRT-PCR, immunoblotting
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within