Sort by
Refine Your Search
-
Language Models for Data-to-Text Problems” and involves the study of technical methods and approaches for adapting large language models to tasks mixing text and structured data, such as statistical report
-
research focused on biomedical image computing. Our work involves developing state-of-the-art methods for image segmentation, detection, classification, predictive modelling, and image enhancement. We aim
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
personalized immunotherapies for cancer patients with brain metastasis. The TCI group works at the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human
-
the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human samples with state-of-the-art technologies to profile the immune microenvironment of brain
-
cybersecurity allowing thus to validate and receive feedback from on-the-field cybersecurity practitioners. As generative AI (GenAI) platforms and large language models (LLMs) are increasingly integrated
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
one-fits-all model was proven unsuccessful. Large Language Models (LLMs) and knowledge graph models are expected to harmonize the formats and semantics but there are many open questions about their
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security