396 computer-programmer-"https:"-"FEMTO-ST"-"https:"-"https:"-"https:"-"https:" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
financial hardship . Benefits $6000 per annum (48 credit points of study) until the minimum points for your degree are completed. An invitation to apply for a place in Monash Minds , a leadership program for
-
Studies, Diploma of Higher Education, or Monash Enabling program at a Monash campus in Australia. Required to relocate from a regional or remote area for study Experiencing financial hardship . To be
-
result of my scholarship, I have been able to purchase a new computer to assist in my studies. This improved my capacity to focus on my studies and achieve my academic goals. Law has been a dream of mine
-
. Leveraging techniques such as federated learning, differential privacy, and secure multiparty computation, the goal is to enable collaborative ML tasks without compromising the privacy of individual data
-
sound and music, computational design, and tangible and physical computing. This position offers the opportunity to engage in impactful research and contribute to the development of new technologies
-
largely opaque to computational analysis, into a transparent phenomenon from which selected features can be captured and rendered visible for the purposes of professional development for teachers. Depending
-
Academic achievement and need. The merit of the proposed work program in the seriously disadvantaged community (as determined by the selection committee). The quality of the written submission, in which
-
status (SES) area To be eligible for this scholarship, candidates must have been accepted to participate in the Access Monash program. Benefits $8,000 per annum (48 credit points of study) up to a maximum
-
In recent years, the rise in cybercrimes has significantly increased the vulnerability of the open internet to various threats and cyber-attacks. Among these, phishing stands out as one of the most perilous crimes worldwide. In a phishing attack, perpetrators create fraudulent websites that...
-
This project focuses on developing algorithms capable of automatically identifying and categorizing mobile ringtones. This involves leveraging machine learning techniques to analyze audio signals from mobile devices and classify them into different categories or types of ringtones. The...