Skip to content

Artificial Intelligence

Allen School researchers are at the forefront of exciting developments in AI spanning machine learning, computer vision, natural language processing, robotics and more.

We cultivate a deeper understanding of the science and potential impact of rapidly evolving technologies, such as large language models and generative AI, while developing practical tools for their ethical and responsible application in a variety of domains — from biomedical research and disaster response, to autonomous vehicles and urban planning.


Groups & Labs

Stacked rocks in a beach scene

SAMPL

SAMPL is an interdisciplinary machine learning research group exploring problems across the system stack, including deep learning frameworks, specialized hardware for training and inference, new intermediate representations and more.

A conceptual graphic showing a jumble of letters spread out around a more concentrated ball of letters

Tsvetshop

Tsvetshop researchers aim to develop practical solutions to natural language processing problems that combine sophisticated learning and modeling methods with insights into human languages and the people who speak them.


Faculty Members

Faculty

Faculty


Centers & Initiatives

UW MEM-C logo

Molecular Engineering Materials Center (UW-MEMC)

MEM-C is a NSF Materials Research Science and Engineering Center that integrates materials innovations with theory and computation to advance spin-photonic nanostructures and elastic layered quantum materials, aided by an “AI Core” that integrates artificial intelligence-driven materials discovery.

ACTION logo

NSF AI ACTION Institute

The NSF AI Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION) seeks to change the way mission-critical systems are protected against sophisticated, ever-changing security threats. In cooperation with (and learning from) security operations experts, intelligent agents will use complex knowledge representation, logic reasoning, and learning to identify flaws, detect attacks, perform attribution, and respond to breaches in a timely and scalable fashion.

Highlights