354 computer-security "https:" "https:" "https:" "https:" "UCL" "UCL" uni jobs at Monash University
Sort by
Refine Your Search
-
Listed
-
Field
-
package should be prioritised are surprisingly difficult computational tasks. State-of-the-art high-performance algorithms are used to calculate routes for the vehicles in order to minimise costs and
-
. For more information on the work we do, please visit our website: http://www.monash.edu/vpfinance The Opportunity The Strategic Sourcing Manager position is an important role that drives the development and
-
. The result will be a thesis in the field of interaction design, contributing to our understanding of experiencing the human body as play. For more info see http://exertiongameslab.org
-
Hoven (elisevandenhoven.com). See also our dedicated post about this on our website. For more information see http://exertiongameslab.org The result will be a thesis in the field of interaction design.
-
This project draws on a recent Dagstuhl Seminar (https://www.dagstuhl.de/en/program/calendar/semhp/?semnr=18322) that brought together leading experts from industry and academia, including those who
-
analysis, contextual analysis, audio feature extraction, and machine learning models to identify and assess potentially dangerous content. Similarly, computer vision models are implemented to analyse images
-
wastage. These improvements should provide significant benefits, such as reducing severe losses due to cybercrimes and enhancing national security for Australians. [1] Darban, Z. Z., Webb, G. I., Pan, S
-
Artificial Intelligence (AI) models are widely used in decision making procedures in many real-world applications across important areas such as finance, healthcare, education, and safety critical
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
management, distributed computing, and energy-aware computing, preparing them for impactful roles in industry and research. Key Components and Example Scenarios Predictive Resource Allocation and Load