426 computer-programmer-"https:"-"FEMTO-ST" "https:" "https:" "https:" "https:" "https:" "ASNR" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Economics
- Medical Sciences
- Engineering
- Business
- Science
- Humanities
- Materials Science
- Law
- Education
- Mathematics
- Philosophy
- Biology
- Linguistics
- Environment
- Arts and Literature
- Psychology
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 12 more »
- « less
-
research program in genomics in any of its forms and contribute to the education program of the School of Biological Sciences in areas broadly related to your expertise. As a Senior Lecturer you would lead
-
My interests span a wide range of topics in theoretical physics, including: geometric phases, topological defects in matter and radiation fields, inverse problems (scalar and vector tomography), singular optics, using electrons, atoms and light and the exploration of complex systems using...
-
a scholarship has assisted me in relieving some of the financial pressures of study. Further, as a result of my scholarship, I have been able to purchase a new computer to assist in my studies
-
Authorised by: Marketing, Faculty of IT , Monash University . Maintained by: Marketing, Faculty of IT . Copyright © 2024 Monash University. ABN 12 377 614 012 Accessibility - Disclaimer and copyright - Privacy , Monash University CRICOS Provider Number: 00008C, Monash College CRICOS Provider...
-
Minds , a leadership program for first year students. Number offered One scholarship available per year Selection criteria Based on academic achievement and need. Preference will be give for a student
-
between theoretical and computational high-energy physics. The research contributes to the world-leading PYTHIA Monte Carlo Event Generator, which serves as the baseline for the majority of experimental
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
As humans we have the ability, and even the necessity of distinguishing between orders that are ethical, safe and necessary and orders that may be harmful or unethical. Theoretically this ability should exist in robots. To coin Assimov’s second law “A robot must obey orders given by human beings...
-
result of my scholarship, I have been able to purchase a new computer to assist in my studies. This improved my capacity to focus on my studies and achieve my academic goals. Law has been a dream of mine
-
computational while other work will involve time spent in the lab. Search for physics beyond the Standard Model in penguin decays in data from the LHCb experiment. Identify particle identification requirements