In the lead up to the 2018 Cyber Security Challenge Australia (CySCA) held on 22-23 August, ANU is running a series of workshops that are organised by Canberra-based cyber security education company Fifth Domain, to train students in the...
Cedric Scheerlinck
Abstract:
Event cameras provide asynchronous, data-driven measurements of pixel-wise temporal contrast with extremely high temporal resolution over a large dynamic range. Events represent discrete pixel-wise brightness...
Calling all computer science and technology higher education students. The ANU College of Engineering & Computer Science and Intelledox are hosting Hackfest 2018 from 3-5th of August.
Form a small team (maximum four people), and then...
Are you interested in studying for a research degree in Computer Science?
Join one of our research groups under the School's overarching research themes of Artificial Intelligence, Systems and Theory. Learn with world-leading computer...
CECS students are invited to a lunchtime forum with College Dean, Professor Elanor Huntington.
This is a chance to hear more about Reimagine, an ANU project that aims to explore why the engineering and computing disciplines need to evolve...
The ANU Centre for European Studies has recruited eight visiting Fellows to run a series of Europa Policy Labs. This is part of an EU funded Erasmus+ Jean Monnet Project and will focus on specific policy challenges including environment,...
In the lead up to the 2018 Cyber Security Challenge Australia (CySCA) held on 22-23 August, ANU is running a series of workshops that are organised by Canberra-based cyber security education company Fifth Domain, to train students in the...
Many mechanical systems exhibit continuous symmetries that lead to dynamic models for those systems where the state space carries the structure of a homogeneous space of the symmetry Lie group. These models are prevalent in mobile robotics...
The digital economy is awash with fast-paced innovation, and for tech start-ups there is constant pressure to keep up. With so many other competing business priorities, thinking about intellectual property (IP) for ICT products and...
Title: How did we let the Digital Surveillance Economy come into existence? And what can we do about it?
Abstract:
Consumers have become dependent on gratis computing services. But the World Wide Web has been subverted to enable the...