Sort by
Refine Your Search
-
approximation algorithms for deriving dual bound within a branch-and-bound algorithms. Other directions could use Machine Learning or new decompositions. This subject is generally quite open so it is important to
-
PETs: This aspect requires a significant math background as it involves exploiting various mathematical results to develop a concrete cryptographic algorithm. Although desired, background in advanced
-
Prof Kim Marriott, Director of MATS, Faculty of IT Email: Kim.Marriott@monash.edu Note that he will not necessarily be the PhD supervisor but based on the topic will match you with an appropriate
-
science conference [1]; one of our papers is recognised as Clarivate Web of Science HighCite (top 1% of papers for the field of research) [2]; three of our algorithms (TS-Chief, InceptionTime and Rocket
-
of fixing defects and the workload among software engineers. This project is aligned with Prof John Grundy (2019 ARC Laureate Fellow, Human-Centric Model-Driven Requirement Engineering) and Dr Chakkrit
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available
-
This project will investigate and develop the ways in which AI algorithms and practices can be made transparent and explainable for use in law enforcement and judicial applications The Faculty
-
as networks or graphs in the hope of reasoning about them - but the tools that we have for understanding such network structured data (whether algorithmic analytics or visualisation tools) remain crude
-
particularly interested in supervising students focusing on two broad scenarios: Analytics of the classroom physical space. This would include collecting information via sensors from authentic classrooms and
-
Connected Autonomous Vehicle (MCAV) team. Required knowledge Artificial Intelligence Machine learning Software Testing Genetic Algorithms