Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
of the art in emerging wireless networks; - identify and select the methodologies and approaches suitable for the development of the work; - develop the grant holder research and development capabilities
-
of a distributed sensing system using polarization, as well as the respective data processing and analysis. 3. BRIEF PRESENTATION OF THE WORK PROGRAMME AND TRAINING: The work is part of the GEOSENSE
-
person's body joints, for example, in a single frame or sequence of images. It plays a major role in understanding human movement, having wide-ranging applications in fields such as robotics, human-computer
-
opportunity to work in a dedicated and young environment, in close interaction with researchers, master's, doctoral and post-doctoral students working on various topics related to Semantic Annotation and
-
. Although these systems improve the performance of radiologists, they usually only allow visual description of the tumors, limiting themselves to a subjective and qualitative characterization. The objective
-
of a scientific article in co-authorship to disseminate the results obtained 3. BRIEF PRESENTATION OF THE WORK PROGRAMME AND TRAINING: - Familiarization with the LLVM / MLIR ecosystem, especially with
-
writing of scientific publications associated with this work. 3. BRIEF PRESENTATION OF THE WORK PROGRAMME AND TRAINING: 4. REQUIRED PROFILE: Admission requirements: BSc The awarding of the fellowship is
-
of the most studied applications. Although these systems improve the performance of the specialists, they usually only allow simple visual description of findings, limiting themselves to a subjective and
-
research institution, is accepting applications to hire a doctorate researcher for a permanent contract to work at INESC TEC's Centre for High-Assurance Software. The hiring process will follow what is
-
for streaming network data. 3. BRIEF PRESENTATION OF THE WORK PROGRAMME AND TRAINING: Literature review on anomaly detection in network data.; Using social network analysis to detect anomalies in network data