Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Science
- Biology
- Linguistics
- Humanities
- Materials Science
- Arts and Literature
- Mathematics
- Law
- Philosophy
- Education
- Psychology
- Sports and Recreation
- Chemistry
- Earth Sciences
- Design
- Electrical Engineering
- Environment
- Social Sciences
- 13 more »
- « less
-
methods dealing with model complexity - e.g., AIC, BIC, MDL, MML - can enhance deep learning. References: D. L. Dowe (2008a), "Foreword re C. S. Wallace ", Computer Journal , Vol. 51, No. 5 (Sept. 2008
-
Monash Mentor Scholarships The Monash Mentor Scholarship is designed to recognise excellence of students participating in the Access Monash Mentoring program. Mentors have the opportunity to develop
-
on this technology for its automated warehouses and fulfilment centres. The aim of this project is to use discrete optimisation techniques (e.g. Integer Programming) to design new algorithms for MAPF. An example
-
Contemporary filmmakers and visual artists alike are embracing the potential of immersive digital technology – such as Augmented and Virtual Reality – to tell stories in powerful, new and affective
-
Antimicrobial resistance (AMR) is one of the most significant and immediate threats to health in Australia and globally. We are working on harnessing new technologies such as artificial intelligence and next-generation sequencing and to improve the diagnosis, treatment and prevention of AMR...
-
arts, languages, and social sciences, encouraging innovative studies that bridge traditional disciplines. Our faculty operates across six schools and five campuses, delivering programs from undergraduate
-
today will no longer provide security in the presence of such technology. Therefore, cryptography based on “Post-Quantum” (PQ) techniques (that resists attacks by quantum computers) is a central goal for
-
to the programmer to quickly resolve type errors and support there understanding and propagation of types throughout their program.
-
This project will explore the security and privacy challenges inherent in the tokenization of real-world assets (RWAs) using the blockchain technology. As industries increasingly adopt tokenization
-
multidisciplinary in nature, cutting across statistics, econometrics, operations research and data science. Specific project outcomes relate to multiobjective optimisation, expected shortfall and conformal inference