Skip to content

Artificial Intelligence

Allen School researchers are at the forefront of exciting developments in AI spanning machine learning, computer vision, natural language processing, robotics and more.

We cultivate a deeper understanding of the science and potential impact of rapidly evolving technologies, such as large language models and generative AI, while developing practical tools for their ethical and responsible application in a variety of domains — from biomedical research and disaster response, to autonomous vehicles and urban planning.


Groups & Labs

People wearing AR-VR headsets pointing into the air

Graphics & Imaging Lab (GRAIL)

The work of the Graphics & Imaging Laboratory spans computer graphics, computer vision, generative AI, computational photography, virtual reality, animation and games.

Professor Dieter Fox and a student demonstrate a remote operated robotic arm attempting to pick up a block

Robotics and State Estimation Lab

We are interested in the development of computing systems that interact with the physical world in an intelligent way. To investigate such systems, we focus on problems in robotics and activity recognition.


Faculty Members

Faculty

Adjunct Faculty

Faculty

Faculty


Centers & Initiatives

Change logo

Change

Change is a cross-campus collaboration that explores the challenges of developing technology in the context of positive social change. It seeks to make connections between researchers, outside organizations, and the public to inspire the development of new capabilities aligned with the interests of those most in need.

ACTION logo

NSF AI ACTION Institute

The NSF AI Institute for Agent-based Cyber Threat Intelligence and Operation (ACTION) seeks to change the way mission-critical systems are protected against sophisticated, ever-changing security threats. In cooperation with (and learning from) security operations experts, intelligent agents will use complex knowledge representation, logic reasoning, and learning to identify flaws, detect attacks, perform attribution, and respond to breaches in a timely and scalable fashion.

Highlights