07/03/2014 - 8:08am According to Professor Richard E. Blahut, a former department head of ECE ILLINOIS, the Henry Magnuski Professor and a CSL professor, the best innovations are accomplished when idea-generators and administrators are a cohesive force.
07/01/2014 - 5:33am Shobha Vasudevan, along with her students, Viraj Athavale, Sai Ma and Samuel Hertz, recently received the Best Paper Award at the 2014 Design Automation Conference (DAC), for their research in code coverage of assertions using register transfer level (RTL) source code analysis, which will help with accuracy and speed during the verification process.
06/24/2014 - 6:12am CSL Acting Director and ITI researcher Klara Nahrstedt, the Ralph and Catherine Fisher Professor of Computer Science at the University of Illinois, is one of six new members selected to the Computing Research Association's Computing Community Consortium Council.
06/23/2014 - 4:20am ITI Researcher Sanjay Patel weighs in on Amazon's first foray into the smartphone market -- a new device called the Fire Phone that features 3D display capabilities.
06/17/2014 - 4:26am Over the past few decades, information systems have increasingly replaced human operators and processes, with technology assisting in everything from flying aircraft to regulating heartbeats. As the movement toward more autonomous systems continues, there is a growing need to ensure that these systems are safe and reliable before they are deployed – especially in fields where failure could be fatal.
06/13/2014 - 9:02am Due to a variety of attacks on the energy sector in the last decade, utilities are on high alert for possible infiltrations to their security. Having incorrect or inconsistent configuration of energy sector devices is just one of the areas attackers could leverage to thwart the security measures energy companies have set up. Applying a uniform security policy across electric sector devices is one way that ITI's Tim Yardley, along with co-PIs David Nicol, Bill Sanders and Klara Nahrstedt, have identified to help mitigate these attacks.
06/12/2014 - 9:30am Often the gap between design specification and implementation seems small. A graphic designer is designing and simultaneously creating the finished product. A fashion couturier is taking measurements, making sketches and patterns, and then, voila!, the finished dress is ready. In electrical and computer engineering, however, specification and implementation can seem like remote and isolated processes.
06/05/2014 - 9:41am Because of the vulnerability of IT infrastructures, the power industry has mandated critical infrastructure protection regulations that must be followed by all large electric utilities. Utilities are audited every three years and the price of non-compliance is steep: If they're found to be in violation of any of the regulations, they can face penalties of up to $1 million per day.
05/21/2014 - 10:49am CSL and ITI Professors Rakesh Bobba and Nitin Vaidya recently received a three-year, $400,000 grant from the National Science Foundation for research on developing algorithms and system software for wide-area monitoring of power systems. They will be working with teams at North Carolina State University and the Renaissance Computing Institute (RENCI) at the University of North Carolina at Chapel Hill on the collaborative research grant titled Distributed Asynchronous Algorithms and Software Systems for Wide-Area Monitoring of Power Systems."
05/21/2014 - 5:19am UNIVERSITY OF ILLINOIS -- Some sharp minds at UI will try to change the country's cyber-security problem. The NSA gave the school a grant worth about $2 million. 18 professors and 18 graduate students will try to come up with long-term solutions to the problem. The UI is one of four universities to get the grant; Carnegie Mellon, the University of North Carolina and the University of Maryland are the other three.
05/19/2014 - 4:57am The NSA awarded $2.1 million to Illinois' Information Trust Institute to create the Science of Security for Systems Lablet. The Illinois Lablet will focus on security at the systems level, with the ultimate goal of providing methodologies for end-to-end security analysis of systems ranging from the power grid to the Internet.
05/01/2014 - 4:23am The Chicago Tribune consulted with Jana Sebestik, TCIPG's Education Coordinator and College of Education Assistant Director of STEM Curriculum Design, on a feature about the use of the Minecraft video game in K12 education.
03/20/2014 - 4:18am Due to advancement in cyber attack methodology, many companies are being encouraged to employ thorough security measures to combat the increasingly widespread attacks. This is evident in the release of cyber security frameworks such as the NIST Cyber Security Framework that was created from Presidential Executive Order 13636. For instance, utility companies, in particular, need to go beyond just guarding their networks at the edge, and begin protecting at deeper network levels as well. The current edge-based firewall approach, as well as the lack of widely deployed security protections in existing protocols, presents problems that require new, resilient and intelligent protection schemes.
03/14/2014 - 6:17am If Alexander Graham Bell came back today and saw the improvement technology has made on his first telephone, he would be astonished. But according to CSL Professor Peter Sauer, if Thomas Edison came back, he wouldn't be all that surprised at what has developed in the power industry. Electric power grid utilities have been criticized for being old and decrepit and stodgy and in a way, that's true, Sauer said. So the smart grid is a way of advancing the technology of the power system by using computers, cell phones, etc. The industry is changing and whether we help it or not is up to us. We could sit back and teach the same old stuff we always teach or we could get out and push the edge.
University of Illinois at Urbana-Champaign central to new, $320-million Digital Lab for Manufacturing02/26/2014 - 9:05am Representatives from the University of Illinois at Urbana-Champaign stood alongside President Obama yesterday, February 25, as he announced a new Chicago-based public-private partnership called the Digital Lab for Manufacturing.
01/08/2014 - 7:04am Where are the country's most innovative and creative tech hubs? The answer to that question used to be easy.
12/16/2013 - 6:47am From financial to medical information, our most private data is increasingly online -- and so are the cyber criminals who seek to sabotage the information systems that support the data. But while the number of cyber crimes has steadily risen over the years, the number of cyber security experts needed to stop them has not kept pace.
11/18/2013 - 10:24am The term virtual time typically conjures up images of space age time machines and Back to the Future movies, but the reality of virtual time within computer systems isn't just something of the future. Rather, it's an old concept in computer science, with new applications that researchers at the Information Trust Institute have been developing.
10/14/2013 - 6:37am ITI Research Scientist Sibin Mohan was recently awarded a three-year, $600,000 grant from the Office of Naval Research to work on integrating security into embedded real-time systems in a fundamental way.
10/09/2013 - 4:09am The Ameren center will provide opportunities for collaboration between the utility and Illinois cyber security researchers.