407 parallel-computing-numerical-methods-"DTU" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
to advance computer skills are desirable, but not essential. A valid driver’s license and willingness to drive to general practice clinics, patient homes and other care settings, will be required. This is
-
The Opportunity The Manager – Cyber Threat Intelligence (CTI) & Security Agency Relations designs and builds a sustainable CTI practice ensuring compliance with the Australian Defence Industry Security Program
-
was Dean of the Faculty of Arts from 1999 to 2006. It celebrates the achievements of students who have overcome serious academic hardship and are eligible to enter the honours program. You will receive a
-
annum (tax exempt) via a student scholarship managed by Monash University. RACE will also supply up to $3,000 per annum for expenses for the candidate, for items such as a computer, publishing fees
-
modeling malaria incidence using complex categorical household data: The minimum message length (MML) method applied to Indonesian data", Computational Ecology and Software, 2012, 2(3):140-159 Wallace, C.S
-
, representing a significant reduction of the cost of the MRI scan per patient. This project will develop cutting edge data processing methods for mobile MRI scanners and testing in clinical enviroment.
-
The brain is a complex system and monitoring and imaging methods to observe critical neurophysiological variables underlying brain function are limited. This project works at the intersection
-
Agent-based computational simulations are now widely employed to study the evolution of behaviour, e.g., predator-prey simulations, the evolution of cooperation and altruism, the evolution of niches
-
In this project, we will use machine learning methods to diagnose the health status of bee colonies and individual bees. Bee populations are threatened worldwide due to a number of factors
-
This project aims to identify novel methods for inferring actors, activities, and other elements from short message communications. Covert communications are a specialist domain for analysis in