Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
: Prof David Lewis and A/Prof Phil van Eyk School of Chemical Engineering School of Chemical Engineering Email: david.lewis@adelaide.edu.au ; philip.vaneyk@adelaide.edu.au Applying: Expression of
-
to finalise contract terms, including pricing and payment schedules Tracking business development activities, reporting on key metrics, and analysing data to improve performance Excellent written and verbal
-
is likely to be tax exempt, subject to Taxation Office approval. Enquiries: Contact Person: A/Prof John Semmler School of Biomedicine Tel: (08) 8313 7192 Email: john.semmler@adelaide.edu.au
-
. The successful applicant will work on decision making for anomaly detection, behaviour analysis and surveillance decisions, under the direction of A/Prof Claudia Szabo in the School of Computer and Mathematical
-
the direction of A/Prof Claudia Szabo in the School of Computer and Mathematical Sciences at the University of Adelaide. This position will work with our partners Praetorian Aeronautics and their testing team
-
is working to be the state’s world-class cancer research institute, jointly resourced by the Federal Department of Health, CALHN and the University of Adelaide. Reporting to Associate Prof. Robin Hobbs
-
models through specific activation functions. This project will be undertaken in collaboration with Dr Hemanth Saratchandran and Prof Simon Lucey of the Australian Institute for Machine Learning, and
-
Lucey, and AIML Chief Scientist, Prof Anton van den Hengel, their research team, and CommBank representatives to publish high-impact research and develop innovative AI solutions for the financial sector
-
, or spatial relationships of objects—and to indicate when it is unsure about its input. Key expected outcomes include the creation of monitoring algorithms that identify early signs of performance issues, and
-
group to work on a project developing provable network security methods that use higher-order graph-based abstractions to model networks and network security problems. Scalable algorithms developed