Computer science
Research
Computer Science has a long tradition of excellence at Melbourne. The arrival of Australia’s first computer to Melbourne in 1956 form the roots of our current computing research, which still examines how to realise the full potential of computer technology.
Our main strands of research balance theoretical and applied, established and new fields of exploration. Current areas of excellence include programming languages, algorithms, distributed computing, and cybersecurity and cryptography.
Programming languages
The design of programming languages and programming constructs is a fundamental area of research in computing. We are currently investigating the automatic resolution of complex constraints, program analysis and program verification.
Data structures and algorithms
Effective data structures and algorithms optimise the performance of any computer program. Computer science has a number of continuing areas of interest including text information retrieval (search) technology, text indexation and compression, and the analysis of big data.
Distributed computing
Our world-leading distributed computing research group is pushing the boundaries of how we can extract more performance and computer-power from large-scale networks of computing devices. Fog, edge, cloud and grid computing issues are a continuing focus of our distributed computing work.
Cloud Computing and Distributed Systems Laboratory
Cybersecurity and cryptography
The security of online systems is of rising importance in the digital economy. Melbourne is examining how to provide effective protections against malicious attack and intrusion, keeping your data both private and safe.
Academic Centre of Cyber Security Excellence
Melbourne eResearch Group (MEG)
The Melbourne eResearch Group (MEG) supports the development, support and delivery of research-oriented IT systems to a wide range of research communities at the University of Melbourne. We provide research-oriented software engineering using a combination of the current bleeding edge technologies through to more tried and trusted software solutions.
Melbourne eResearch Group (MEG)
The group is based in the School of Computing and Information Systems at the University of Melbourne, Australia.
People
Given name | Family name | Position | Profile | |
---|---|---|---|---|
Lachlan | Andrew | Lecturer | Profile | lachlan.andrew@unimelb.edu.au |
Joseph | Bonneau | Associate Professor Of Cybersecurity | Profile | joseph.bonneau@unimelb.edu.au |
Rajkumar | Buyya | Redmond Barry Distinguished Professor | Profile | rbuyya@unimelb.edu.au |
Farhana | Choudhury | Lecturer | Profile | farhana.choudhury@unimelb.edu.au |
Shaanan | Cohney | Lecturer | Profile | cohneys@unimelb.edu.au |
Ni | Ding | Doreen Thomas Postdoctoral Fellow | Profile | ni.ding@unimelb.edu.au |
Patrick | Eades | Research Fellow in Approximate Data Structures | Profile | patrick.eades@unimelb.edu.au |
Junhao | Gan | Lecturer | Profile | junhao.gan@unimelb.edu.au |
Bach | Le | Lecturer | Profile | bach.le@unimelb.edu.au |
Olya | Ohrimenko | Senior Lecturer | Profile | olga.ohrimenko@unimelb.edu.au |
Alistair | Moffat | Professor | Profile | ammoffat@unimelb.edu.au |
Toby | Murray | Associate Professor | Profile | toby.murray@unimelb.edu.au |
Udaya | Parampalli | Professor | Profile | udaya@unimelb.edu.au |
Thuan | Pham | Lecturer in Cybersecurity | Profile | thuan.pham@unimelb.edu.au |
Lida | Rashidi | Postdoctoral Fellow and Lecturer | Profile | rashidil@unimelb.edu.au |
Christine | Rizkallah | Senior Lecturer | Profile | christine.rizkallah@unimelb.edu.au |
Maria | Rodriguez Read | Lecturer | Profile | marodriguez@unimelb.edu.au |
Peter | Schachte | Senior Lecturer | Profile | schachte@unimelb.edu.au |
Richard | Sinnott | Professor Applied Computing Science and Director, eResearch | Profile | rsinnott@unimelb.edu.au |
Robert | Sison | Research Fellow | Profile | robert.sison@unimelb.edu.au |
Egemen | Tanin | Professor | Profile | etanin@unimelb.edu.au |
Christoph | Treude | Senior Lecturer | Profile | christoph.treude@unimelb.edu.au |
Johanne | Trippas | Doreen Thomas Postdoctoral Fellow | Profile | johanne.trippas@unimelb.edu.au |
Tony | Wirth | Professor | Profile | awirth@unimelb.edu.au |
Hairuo | Xie | Research Fellow | Profile | xieh@unimelb.edu.au |
Mansooreh | Zahedi | Lecturer | Profile | mansooreh.zahedi@unimelb.edu.au |
Justin | Zobel | Redmond Barry Distinguished Professor and Pro Vice-Chancellor (Graduate & International Research) | Profile | jzobel@unimelb.edu.au |
Computer Science Graduate Researchers
Given | Family name | Profile | Thesis Title |
---|---|---|---|
Siddharth | Agarwal | Profile | Serverless computing optimization: reducing cold starts |
Kasun | Amarasinghe | Profile | Learning index structure for multi-dimensional spatial data |
Philip | Cervenjak | Profile | Approximation algorithms for submodular optimisation |
Ming | Chen | Profile | A heterogeneous stream processing system based on online learning and blockchain in IoT |
Zhuo (Zoey) | Chen | Profile | A Verified Cost Model for Lambda Calculus |
Louis | Cheung | Profile | Formally Verified Data Compression Algorithms |
Qifan | Deng | Profile | An Energy-Efficient Distributed System for Integration of Heterogeneous Resources |
Luxin | Fang | Profile | Estimation of distribution power network topology from smart meter measurements |
Duneesha | Fernando | Profile | Performance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms |
Wentao | Gao | Profile | Human-in-the-loop fuzzing for effective vulnerability discovery |
Shuzhi | Gong | Profile | Social Media Fake News Detection Through Graph Based Deep Learning |
Zifeng (Peaker) | Guo | Profile | Efficient structures for recency and string-searching queries in data streams |
Yulun | Huang | Profile | Resource Management and Application Scheduling in Big Data Cloud |
Zuo | Huang | Profile | Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion |
Vincent | Jackson | Profile | Mechanised High-Level Verification for Concurrent Low-level Programs |
Amanda | Jayanetti | Profile | Understanding User Attention in Mobile Augmented Reality |
Jiankai | Jin | Profile | Analysing utility and tradeoffs of multi-party machine learning |
Vinay | Kabadi | Profile | Automated software regression bug fixing |
Rabindra | Lamsal | Profile | Social media analytics: a real-time machine learning approach |
Cong Thanh | Le | Profile | Automated Software Bug Fixing |
Alex Jacey | Ligthart-Smith | Profile | Preserving data privacy with semi-trusted adversaries |
Chun Wei | Lim | Profile | High Performance Stream Processing for Machine Learning Pipeline |
Pilar Selene | Linares Arévalo | Profile | Refinement types to simplify verification |
Han | Liu | Profile | Enhancing Scientific Document Categorization with Taxonomy Information |
Anupama Ruwanthika | Mampage | Profile | Context-aware dynamic resource management in fog/edge computing environments |
Tharindu Lakmal | Muthugama | Profile | Spatiotemporal data and future transportation systems |
Saeed | Nasehibasharzad | Profile | A high performance and near real-time integrated driving navigation and traffic controlling system |
Mak | Nazecic-Andrlon | Profile | Efficient interval reasoning for floating-point arithmetic |
Huy | Nguyen | Profile | Encoding additional natural language artefacts for better code representation |
Thanh-Dat | Nguyen | Profile | Machine learning for program synthesis |
Thanh Hoa | Nguyen | Profile | Serverless Quantum Cloud Computing |
Samodha Kanchani | Pallewatta | Profile | Mobility-aware application modeling in edge and fog computing environments |
Lianglu | Pan | Profile | Automated vulnerability and flaw detection in network communications |
Yao (Alwyn) | Pan | Profile | Cloud-based container orchestration optimisation to improve scalability in hybrid cloud |
Kalyani | Penyala | Profile | Machine learning-based Management of Data Centre Resources for Green Cloud Computing |
Larissa | Salerno | Profile | Software installation in third-party software ecosystems |
Tharindu Bandara | Saryakara Hewage | Profile | Learning-centric Resource Management in Energy-efficient Cloud Computing |
Elisa | Shioji | Profile | Rules as code: Can privacy be automated? |
Kwangsuk | Song | Profile | Storage systems management in cloud computing environments |
Kanwal Aslam | Syed | Profile | Hash based post quantum cryptography on FPGA |
Samuel | Thomas | Profile | Designing Efficient Algorithms for Big Data |
Chenhao | Tong | Profile | Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning |
Faxing | Wang | Profile | Removing trust assumptions for distributed zero-knowledge proofs |
Lingfei | Wang | Profile | High performance event detection and tracking in social media |
Peiyong | Wang | Profile | Quantum Computing |
Zhe | Wang | Profile | Privacy-oriented Deployment of Health Application in Distributed Clouds |
Zhiyu | Wang | Profile | A New Approach for Efficient Deployment of Applications in Edge Cloud |
Hao | Wu | Profile | Privacy Preserving Data Analysis |
Ziren | Xiao | Profile | Runtime optimisation of distributed systems using reinforcement learning |
Pengbo | Yan | Profile | Scalable, Principled Vulnerability Detection via Insecurity Logics |
Renlord | Yang | Profile | On the design of private, anonymous and trustless protocols in public blockchains |
Zhiyuan | Zhang | Profile | Investigating and mitigating performance interference of shared execution in browsers |
Zhuo | Zhang | Profile | Efficient algorithms for solving problems on massive data |
Jie | Zhao | Profile | Autonomous workload management in federated cloud computing environments |
Zihan | Yang | Profile | Deep learning in applications with limited data and computation resources |
Zhuowei | Zhao | Profile | Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data |
Mike | Zhuang | Profile | Does the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act |