589 professor-computer-science-"https:"-"https:"-"https:"-"https:" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Science
- Materials Science
- Biology
- Linguistics
- Arts and Literature
- Education
- Law
- Mathematics
- Humanities
- Environment
- Philosophy
- Chemistry
- Psychology
- Sports and Recreation
- Earth Sciences
- Electrical Engineering
- Design
- Social Sciences
- 13 more »
- « less
-
Master of Commerce Scholarship Sir John Monash Fee Scholarship The Master of Commerce is a research-oriented programme preparing students for a PhD and an academic career. Offered as part of
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
and Inductive Inference by Minimum Message Length'', Springer (Link to the preface [and p vi, also here]) Wallace, C.S. and D.L. Dowe (1994b), Intrinsic classification by MML - the Snob program. Proc
-
the power of LLMs to develop advanced computational methods for the detection and mitigation of misinformation and disinformation. More specific objectives are: To investigate the effectiveness of large
-
Answering over Knowledge Bases. Journal of Web Semantics, 2020. Hua, Yuncheng; Li, Yuan-Fang; Haffari, Reza; Qi, Guilin; Wu, Wei. Retrieve, Program, Repeat: Complex Knowledge Base Question Answering via
-
, Nursing and Health Sciences is seeking a Senior Events Coordinator to join the Faculty Office External Relations team. This role plays an important part in delivering the Faculty’s strategic events and
-
Species’ distributions are shifting in response to global climate change and other human pressures. Accurate methods to monitor and predict distribution shifts are urgently needed to manage threatened species and ecosystems, and to control invasive species and diseases. This requires a...
-
Deepfakes, derived from "deep learning" and "fake," involve techniques that merge the face images of a target person with a video of a different source person. This process creates videos where the target person appears to be performing actions or speaking as the source person. In a broader...
-
range of stakeholders and negotiate positive outcomes to complex issues. You will also have highly developed computer literacy, including experience with business and design software, with proficiency in
-
Advisory System, or data from other implantable or wearable devices. This involves consideration of both feature-based machine learning or data science approaches and neural mass parameter estimation