Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
- Monash University
- Curtin University
- University of Adelaide
- La Trobe University
- University of New South Wales
- Swinburne University of Technology
- The University of Queensland
- CSIRO
- Nature Careers
- RMIT University
- AUSTRALIAN NATIONAL UNIVERSITY (ANU)
- Amgen Scholars Program
- Australian National University
- James Cook University
- RMIT UNIVERSITY
- The University of Newcastle
- The University of Western Australia
- UNIVERSITY OF WESTERN AUSTRALIA
- University of Melbourne
- University of Sydney
- 10 more »
- « less
-
Field
-
. Theoretical and Experimental Results for Planning with Learned Binarized Neural Network Transition Models . In CP 2020, pages 917-934, 2020.
-
in my group also work on theoretical studies of stars with binary companions including studying the rates of classical novae and the impact of a binary companion on a star's ability to make elements
-
application, AML has attracted a large amount of attention in recent years. However, the underlying theoretical foundation for AML still remains unclear and how to design effective and efficient attack and
-
. Among the approaches used will be the Bayesian information-theoretic Minimum Message Length (MML) principle (Wallace and Boulton, 1968; Wallace and Dowe, 1999a; Wallace, 2005) References: Wallace, C.S
-
cooperating with each other, but in many cases competing for individual gains. This structure may not always work for the benefit of science. The purpose of this project is to use game theory and computational
-
Computational simulations are now widely employed to study the behaviour of social systems, examples being market behaviours, and social media population behaviours. These methods rely heavily
-
back at least as far as 1954 (Dowe, 2008a, sec. 1, pp549-550). Discussion of how to do this using the Bayesian information-theoretic minimum message length (MML) approach (Wallace and Boulton, 1968
-
the Faculty of Science. We will apply Bayesian approaches such as the information-theoretic minimum message length (MML) principle and other approaches to develop a path towards statistically-optimal algorithms
-
used will the information-theoretic Bayesian minimum message length (MML) principle. Student cohort PhD, possibly Master’s (Minor Thesis) or Honours URLs/references Chen, Li and Gao, Jiti and Vahid
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within