Sort by
Refine Your Search
-
Listed
-
Field
-
Computational simulations are now widely employed to study the behaviour of social systems, examples being market behaviours, and social media population behaviours. These methods rely heavily
-
systems and swarm robotics. The project builds on well established computational and mathematical modelling techniques to achieve its aims. Departure points will be agent-based simulations, optimisation
-
Automated Program Repair (APR) is the grand challenge in software engineering research. Many APR methods have shown promising results in fixing bugs with minimal, or even no human intervention
-
Research Training Program (RTP) Stipend Research Training Program (RTP) Scholarships, funded by the Australian Government, support both domestic and international students undertaking Research
-
"A picture is worth a thousands words"... or so the saying goes. How much information can we extract from an image of an insect on a flower? What species is the insect? What species is the flower? Where was the photograph taken? And at what time of the year? What time of the day? What was the...
-
. Required knowledge Strong background in machine/deep learning, computer vision, or applied statistics. Solid programming skills in Python and experience with deep learning frameworks (e.g., PyTorch
-
package should be prioritised are surprisingly difficult computational tasks. State-of-the-art high-performance algorithms are used to calculate routes for the vehicles in order to minimise costs and
-
With success stories ranging from speech recognition to self-driving cars, machine learning (ML) has been one of the most impactful areas of computer science. ML’s versatility stems from the wealth
-
that occurs within these biological neural networks, so that these networks can be leveraged for AI applications. In addition, you will develop mathematical and computational neuroscience models
-
representations complicate transparency and compliance checks with data protection and privacy legislation (e.g., GDPR) whether performed by humans or computer systems. Second, both privacy-preserving distributed