379 engineering-computation "https:" "https:" "https:" "https:" "https:" "https:" "https:" "CNRS " uni jobs at Monash University
Sort by
Refine Your Search
-
Listed
-
Field
-
. one in the Science, Technology, Engineering and Mathematics (STEM) disciplines. Selection criteria Relevance, quality and achievability of projects to the Monash-Museums Victoria collaborative research
-
, the candidate will work with leading researchers in IT and engineering, access world-class research resources, learn state-of-the-art techniques, such as spatio-temporal data analytics, stochastic optimisation
-
Research Training Program (RTP) Stipend Research Training Program (RTP) Scholarships, funded by the Australian Government, support both domestic and international students undertaking Research
-
Microbiology in Water Engineering Scholarship The Microbiology in Water Engineering scholarship be introduced to encourage students to begin thinking about the interdisciplinary of planetary health
-
Computational simulations are now widely employed to study the behaviour of social systems, examples being market behaviours, and social media population behaviours. These methods rely heavily
-
: Current student enrolled in an undergraduate degree in the Faculty of Engineering or other STEM faculties at a Monash campus in Australia. Are an Indigenous Australian ** **To be eligible you must provide a
-
Technology: Theory and Applications, pages 123–149. Springer, 2010. O. Biran and K. McKeown. Human-Centric Justification of ML Predictions. In IJCAI2017, pages 1461–1467, 2017. L. Cavazos Quero et al.˙ Jido: A
-
of the following would be useful: stakeholder engagement, (IT) system design, basic web programming, and technology evaluation. Experience in Indigenous and qualitative research methods is desirable, and Indigenous
-
In collaboration with people from Monash materials engineering, neuroscience and biochemistry we are developing living AI networks where neurons in a dish are grown to form biological neural
-
This project will explore the security and privacy challenges inherent in the tokenization of real-world assets (RWAs) using the blockchain technology. As industries increasingly adopt tokenization