Pervasive Technology Institute
Permanent link for this communityhttps://hdl.handle.net/2022/357
The Pervasive Technology Labs will help Indiana University attain a position of international leadership in research accomplishment, and enhance the prosperity of the State of Indiana, enabling it to become a national leader in economic status and quality of life.
Browse
Browsing Pervasive Technology Institute by Title
Now showing 1 - 20 of 340
- Results Per Page
- Sort Options
Item 20 Jahre Zusammenarbeit unter dem Motto: „Was ist heute wichtig?“(2019-10-23) Stewart, Craig A.Item 20 years of success: the Indiana University Pervasive Technology Institute with a focus on the evolution of the Center for Applied Cybersecurity Research(2019-10-30) Stewart, Craig A.; Welch, VonItem 20 years of success: the Indiana University Pervasive Technology Institute with a focus on the evolution of the Center for Applied Cybersecurity Research.(2019-11-19) Stewart, Craig A.; Welch, VonItem 2011 annual report on training, education, and outreach activities of the Indiana University Pervasive Technology Institute and affiliated organizations(2012) Miller, Therese; Plale, Beth; Stewart, Craig A.This report summarizes training, education, and outreach activities for calendar 2011 of PTI and affiliated organizations, including the School of Informatics and Computing, Office of the Vice President for Information Technology, and Maurer School of Law. Reported activities include those led by PTI Research Centers (Center for Applied Cybersecurity Research, Center for Research in Extreme Scale Technologies, Data to Insight Center, Digital Science Center) and Service and Cyberinfrastructure Centers (Research Technologies Division of University Information Technology Services, National Center for Genome Assembly Support)Item 2012 annual report on training, education, and outreach activities of the Indiana University Pervasive Technology Institute and affiliated organizations(2014-05-08) Miller, Therese; Ping, Robert J.; Plale, Beth; Stewart, Craig A.This report summarizes training, education, and outreach activities for calendar 2012 of PTI and affiliated organizations, including the School of Informatics and Computing, Office of the Vice President for Information Technology, and Maurer School of Law. Reported activities include those led by PTI Research Centers (Center for Applied Cybersecurity Research, Center for Research in Extreme Scale Technologies, Data to Insight Center, Digital Science Center) and Service and Cyberinfrastructure Centers (Research Technologies Division of University Information Technology Services, National Center for Genome Assembly Support)Item 2013 annual report on training, education, and outreach activities of the Indiana University Pervasive Technology Institute and affiliated organizations(2014-05-08) Ping, Robert J.; Miller, Therese; Plale, Beth; Stewart, Craig A.This report summarizes training, education, and outreach activities for calendar 2013 of PTI and affiliated organizations, including the School of Informatics and Computing, Office of the Vice President for Information Technology, and Maurer School of Law. Reported activities include those led by PTI Research Centers (Center for Applied Cybersecurity Research, Center for Research in Extreme Scale Technologies, Data to Insight Center, Digital Science Center) and Service and Cyberinfrastructure Centers (Research Technologies Division of University Information Technology Services, National Center for Genome Assembly Support)Item 2013 annual report on training, education, and outreach activities of the Indiana University Pervasive Technology Institute and affiliated organizations(2014-05) Ping, RobertThe 2013 report discusses the year's training, education, and outreach activities of the Indiana University Pervasive Technology Institute and affiliated organizations.Item 2015 Annual Report and Strategic Plan (2015-2020)(2016) Welch, VonItem 2015 Student Cluster Competition(2017-01) Michael, Scott A.The Student Cluster Competition is an HPC multi-disciplinary experience integrated within the HPC community’s biggest gathering, the Supercomputing Conference. The competition is a microcosm of a modern HPC center that teaches and inspires students to pursue careers in the field. It demonstrates the breadth of skills, technologies and science that it takes to build, maintain and utilize a supercomputer. In this real-time, non-stop, 48-hour challenge, teams of undergraduate and/or high school students assemble a small cluster on the exhibit floor and race to complete a real-world workload across a series of applications and impress HPC industry judges. For more information: http://studentclustercompetition.us/index.html.Item 2016 Annual Report(2017) Welch, VonItem 2016 NSF Community Cybersecurity Benchmarking Survey Report(2016) Cowles, Robert; Jackson, CraigItem 2016 Student Cluster Competition(2017-01) Michael, Scott A.The Student Cluster Competition is an HPC multi-disciplinary experience integrated within the HPC community’s biggest gathering, the Supercomputing Conference. The competition is a microcosm of a modern HPC center that teaches and inspires students to pursue careers in the field. It demonstrates the breadth of skills, technologies and science that it takes to build, maintain and utilize a supercomputer. In this real-time, non-stop, 48-hour challenge, teams of undergraduate and/or high school students assemble a small cluster on the exhibit floor and race to complete a real-world workload across a series of applications and impress HPC industry judges. For more information: http://studentclustercompetition.us/index.html.Item 2017 NSF Community Cybersecurity Benchmarking Survey Report(2018-06) Russell, Scott; Jackson, Craig; Cowles, Bob; Avila, KayThe NSF Community Cybersecurity Benchmarking Survey provides insight into the NSF science community's cybersecurity programs, practices, challenges, and concerns by collecting, analyzing, and publishing useful baseline benchmarking information."Item 2017 Student Cluster Competition(2018) Zhu, XiaoThe Student Cluster Competition is an HPC multi-disciplinary experience integrated within the HPC community’s biggest gathering, the Supercomputing Conference. The competition is a microcosm of a modern HPC center that teaches and inspires students to pursue careers in the field. It demonstrates the breadth of skills, technologies and science that it takes to build, maintain and utilize a supercomputer. In this real-time, non-stop, 48-hour challenge, teams of undergraduate and/or high school students assemble a small cluster on the exhibit floor and race to complete a real-world workload across a series of applications and impress HPC industry judges.Item 2019 NSF Community Cybersecurity Benchmarking Survey Report(2019-12-20) Russell, ScottThe purpose of Trusted CI’s Community Survey project is to collect, analyze, and publish useful baseline benchmarking information about the NSF science community’s cybersecurity programs, practices, challenges, and concerns.Item 2020 CACR AI/ML Lessons Learned Report(2020-07-31) Kiser, Ryan; Adams, Emily K.; Cushenberry, Austin; Abhinit, Ishan; Shute, KelliSince Fall of 2019, the Indiana University Center for Applied Cybersecurity Research (CACR) has been exploring the application of machine learning to cybersecurity workflows with the intent of developing the applicable expertise necessary to maintain a commanding lead in the cybersecurity domain where machine learning solutions are expected to increasingly become the norm. In order to serve the objectives laid out in the project charter, CACR primarily worked in partnership with OmniSOC and researchers at Rochester Institute of Technology to explore the application of the ASSERT research prototype to SOC analyst workflows. The intent of this effort was to better understand both the utility of the ASSERT prototype and the challenges associated with the implementation of machine learning approaches to cybersecurity workflows more broadly.Item 2020 External Review of the Pervasive Technology Institute(2020-05-31) Stewart, Craig A.; Slavin, Shawn; Ping, RobertItem 2021 NSF Cybersecurity Summit Collection of Presentations(2021-10) Welch, Von2021 NSF Cybersecurity Summit Collection of Presentations of slides for Plenary, Workshops & TrainingItem Access Control Policy(2021) Krenz, Mark; Adams, Andrew; Marsteller, JamesItem Achieving low barriers to entry in the FAIR Digital Objects (FDO) data space: a Use Case in Biodiversity Extended Specimen NetworksPlale, BethFor a network of FAIR digital objects (a “data space”) to be fully realized at a global scale, its architecture must possess low barriers to entry to newcomer data providers. Barriers to entry is a measure of the up-front resource demands (costs) required to enter into a line of business or participate in a multi-organizational endeavor. The biodiversity community’s notion of Extended Specimen is a good match as a FAIR Digital Objects (FDO) data space. Extended Specimen is the interconnecting of physical specimen with all manner of derived and/or related data reflecting new sources of data and information related to collected specimens. We look at two possible manifestations of FAIR digital object data space for the global biodiversity community: the DiSSCo project in Europe and an early evaluation being undertaken in the US. Application of the lense of barriers to entry in this context strongly suggests that the FAIR Digital Object data space adopt a policy of flexibility with respect to the requirements it imposes for newcomers.