Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
-house database of experimental real-world data enabling large-scale validation of developed algorithms. Wind turbine drivetrains are critical components, and their failures can lead to significant
-
. To reach level-4/5 autonomy, we need teamwork: nearby vehicles, drones, and roadside units must co-perceive their environment, sharing and fusing complementary sensor views in real time. Yet raw video
-
, or their LiDAR beam is blocked by a truck. To reach level-4/5 autonomy, we need teamwork: nearby vehicles, drones, and roadside units must co-perceive their environment, sharing and fusing complementary sensor
-
Researcher, you will play a key role in developing next-generation quantum sensors based on photonic technologies, with applications spanning high-tech industries, space, and defense. Your work will focus
-
in healthy states, genetically perturbed states, and during liver regeneration. On the other hand, you will develop algorithms to disentangle direct intercellular signals from those that are induced
-
and Saeys teams. In this research project you will develop and apply algorithms to link clinical phenotypes of metastasis to molecular phenotypes in mouse models. It is known that metastases exhibit
-
are searching for a motivated PhD candidate to design practical over-the-air computing algorithms and protocols for future edge AI applications. About the employer The research of this PhD position will be
-
calibration, electronics (e.g. image sensors), … PhD applicants should hold a MSc degree in astrophysics, physics, or engineering, or have obtained an equivalent diploma. Proficiency in English is required
-
trustworthy medical AI? Deep models already outperform humans on many benchmarks, yet in the clinic they remain black boxes: radiologists cannot see why an algorithm flags a lesion, and AI engineers cannot tell
-
Networks, and ICT Services & Applications. Your role Design intelligent agent architectures leveraging large language models (LLMs), planning algorithms, and secure transaction protocols tailored