Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
for the future. The Fraunhofer-Gesellschaft has established eight research and innovation centers in Heilbronn, including one focused on cybersecurity. This center is a new location of the Fraunhofer Institute
-
Future. Discover. Together. Excellent research and innovation are at the centre of the work of the HHI - Fraunhofer Institute for Telecommunications. We are a world leader in researching mobile and
-
Sustainable Development Goals of the United Nations. As an institute of the Fraunhofer-Gesellschaft, we show how to not only master challenges, but grow with them. We push boundaries, think ahead and shape
-
the idea, via design and technology development or realization based on established technologies up to tested prototypes. The department Simulation of Semiconductor Technologies develops and optimizes novel
-
Future. Discover. Together. Excellent research and innovation are at the centre of the work of the HHI - Fraunhofer Institute for Telecommunications. We are a world leader in researching mobile and
-
Our team at Fraunhofer LBF conducts research into solutions for the design of sustainable materials, structures, and systems, as well as circular economy strategies that meet the highest standards
-
on developing key technologies that are vital for the future and enabling the commercial utilization of this work by business and industry, Fraunhofer plays a central role in the innovation process. As a pioneer
-
imbalance (long distribution tails), label noise, non-linear age scale. Existing metrics are critically examined and suitable metrics are identified or developed. New procedures will be designed and evaluated
-
, plan and capture calibration datasets, and translate the results into practice. A fully autonomous calibration pipeline is already available for our 3D scanning systems. You will refine and optimize it
-
systematic framework should be established that: Texts transformed with various obfuscation methods, measuring the impact of these attacks on common AV models, and designing a robust procedure (e.g., through