37 coding-"https:"-"FEMTO-ST"-"CSIC" "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" uni jobs at Monash University in Australia
Sort by
Refine Your Search
-
. For more information on the work we do, please visit our website: http://www.monash.edu/vpfinance The Opportunity The Deputy Director, Category Management is a senior leadership role within Strategic
-
. For more information on the work we do, please visit our website: http://www.monash.edu/vpfinance The Opportunity The Deputy Director, Strategic Sourcing is a senior leadership role within Strategic
-
Code for the care and use of animals for scientific purposes (8th edition 2013 (updated 2021) (the Code)). The AEC is comprised of members across various categories as stipulated in the Code and includes
-
Funding reference https://www.monash.edu/it/nextgen/ai-in-mental-health/projects/headspace-national Learn more about minimum entry requirements . Primary supervisor Levin Kuhlmann Apply now Supervisor
-
various skin condition/s. Relevant resources: DOI: https://doi.org/10.1007/978-3-031-43987-2_20 DOI: https://doi.org/10.1007/978-3-031-43907-0_54
-
locations in hundreds of example video frames. Coding expertise is also needed. These barriers mean that automated behavioural prediction tools are accessible to only a fraction of behavioural research labs
-
, p226, p227] http://dx.doi.org./10.1007/3-540-61863-5_48 Gioacchino, F. D. & Fonseca, J. Q. da. An experimental study of the polycrystalline plasticity of austenitic stainless steel. Int J Plasticity 74
-
This project draws on a recent Dagstuhl Seminar (https://www.dagstuhl.de/en/program/calendar/semhp/?semnr=18322) that brought together leading experts from industry and academia, including those who
-
are being set up, those from the Monash Energy Institute will give you a first idea of the breadth of our activities: https://www.monash.edu/energy-institute Note: while only "Optimisation" is selected as the
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This