Sort by
Refine Your Search
-
Listed
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Arts and Literature
- Law
- Linguistics
- Science
- Humanities
- Materials Science
- Education
- Biology
- Mathematics
- Philosophy
- Design
- Sports and Recreation
- Earth Sciences
- Psychology
- Chemistry
- Electrical Engineering
- Environment
- Social Sciences
- 13 more »
- « less
-
Betty Amsden AO Leadership Scholarship Monash Leaders Scholarship The Betty Amsden AO Leadership Scholarship is awarded to Access Monash mentors each year in recognition of their service and
-
Ventia Scholarship for Women in Engineering Achieving Potential Scholarship for Distinction This scholarship is to assist talented and deserving female students to access tertiary education and to
-
. Leveraging techniques such as federated learning, differential privacy, and secure multiparty computation, the goal is to enable collaborative ML tasks without compromising the privacy of individual data
-
with their community and support other Indigenous students to access higher education. This scholarship is generously funded by the Gandel Foundation. The Gandel family have a close connection with
-
promising results in building prediction models, they are typically data-centric, lack context, and work best for specific feature types. Interpretability is the ability of an ML model to identify the causal
-
in their second or third year of study at Monash University. This scholarship is available to students enrolled in a degree within the Faculty of Engineering, Faculty of Science or Faculty
-
. The goal is to find common brain mechanisms and networks that are effected by different kinds anaesthetics to see if this points to a 'backbone' for the generation of consciousness. Required knowledge
-
Advisory System, or data from other implantable or wearable devices. This involves consideration of both feature-based machine learning or data science approaches and neural mass parameter estimation
-
, Alice has no choice but to give away her highly sensitive information. A more ideal solution is to use a PET tool to provide Alice a way to (cryptographically) prove to SerPro that she is eligible
-
Identifying vulnerabilities in real-world applications is challenging. Currently, static analysis tools are concerned with false positives; runtime detection tools are free of false positives but