07/17/2014 - 6:47am CSL researchers received the inaugural Best Paper Award at last month's 2014 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Additionally, graduate student Cuong Pham was recognized for his outstanding PhD research in this area and was awarded the William C. Carter Award at DSN.
07/15/2014 - 10:37am Cristina Abad, a May 2014 computer science Ph.D. graduate at Illinois, has developed a benchmark designed to model the performance of next-generation storage systems, called MimesisBench, which was featured in ITWorld and PCWorld.
07/11/2014 - 7:10am Assistant Professor Robert Pilawa-Podgurski has received the Richard M. Bass Outstanding Young Power Electronics Engineer Award from the IEEE Power Electronics Society (PELS).
07/10/2014 - 5:27am ECE Assistant Professor Alejandro Dominguez-Garcia has been selected by the National Academy of Engineering to attend the United States Frontiers of Engineering Symposium, along with 82 other engineers who have all been determined by the academy to be future leaders of the engineering field. The event will be Sept. 11-13 in Irvine, California.
07/08/2014 - 6:09am Professor William H. Sanders is ECE ILLINOIS' new department head, Engineering at Illinois Dean Andreas C. Cangellaris announced Thursday. His appointment is effective August 16, 2014.
07/03/2014 - 8:08am According to Professor Richard E. Blahut, a former department head of ECE ILLINOIS, the Henry Magnuski Professor and a CSL professor, the best innovations are accomplished when idea-generators and administrators are a cohesive force.
07/01/2014 - 5:33am Shobha Vasudevan, along with her students, Viraj Athavale, Sai Ma and Samuel Hertz, recently received the Best Paper Award at the 2014 Design Automation Conference (DAC), for their research in code coverage of assertions using register transfer level (RTL) source code analysis, which will help with accuracy and speed during the verification process.
06/24/2014 - 6:12am CSL Acting Director and ITI researcher Klara Nahrstedt, the Ralph and Catherine Fisher Professor of Computer Science at the University of Illinois, is one of six new members selected to the Computing Research Association's Computing Community Consortium Council.
06/23/2014 - 4:20am ITI Researcher Sanjay Patel weighs in on Amazon's first foray into the smartphone market -- a new device called the Fire Phone that features 3D display capabilities.
06/17/2014 - 4:26am Over the past few decades, information systems have increasingly replaced human operators and processes, with technology assisting in everything from flying aircraft to regulating heartbeats. As the movement toward more autonomous systems continues, there is a growing need to ensure that these systems are safe and reliable before they are deployed – especially in fields where failure could be fatal.
06/13/2014 - 9:02am Due to a variety of attacks on the energy sector in the last decade, utilities are on high alert for possible infiltrations to their security. Having incorrect or inconsistent configuration of energy sector devices is just one of the areas attackers could leverage to thwart the security measures energy companies have set up. Applying a uniform security policy across electric sector devices is one way that ITI's Tim Yardley, along with co-PIs David Nicol, Bill Sanders and Klara Nahrstedt, have identified to help mitigate these attacks.
06/12/2014 - 9:30am Often the gap between design specification and implementation seems small. A graphic designer is designing and simultaneously creating the finished product. A fashion couturier is taking measurements, making sketches and patterns, and then, voila!, the finished dress is ready. In electrical and computer engineering, however, specification and implementation can seem like remote and isolated processes.
06/05/2014 - 9:41am Because of the vulnerability of IT infrastructures, the power industry has mandated critical infrastructure protection regulations that must be followed by all large electric utilities. Utilities are audited every three years and the price of non-compliance is steep: If they're found to be in violation of any of the regulations, they can face penalties of up to $1 million per day.
05/21/2014 - 10:49am CSL and ITI Professors Rakesh Bobba and Nitin Vaidya recently received a three-year, $400,000 grant from the National Science Foundation for research on developing algorithms and system software for wide-area monitoring of power systems. They will be working with teams at North Carolina State University and the Renaissance Computing Institute (RENCI) at the University of North Carolina at Chapel Hill on the collaborative research grant titled Distributed Asynchronous Algorithms and Software Systems for Wide-Area Monitoring of Power Systems."
05/21/2014 - 5:19am UNIVERSITY OF ILLINOIS -- Some sharp minds at UI will try to change the country's cyber-security problem. The NSA gave the school a grant worth about $2 million. 18 professors and 18 graduate students will try to come up with long-term solutions to the problem. The UI is one of four universities to get the grant; Carnegie Mellon, the University of North Carolina and the University of Maryland are the other three.
05/19/2014 - 4:57am The NSA awarded $2.1 million to Illinois' Information Trust Institute to create the Science of Security for Systems Lablet. The Illinois Lablet will focus on security at the systems level, with the ultimate goal of providing methodologies for end-to-end security analysis of systems ranging from the power grid to the Internet.
05/01/2014 - 4:23am The Chicago Tribune consulted with Jana Sebestik, TCIPG's Education Coordinator and College of Education Assistant Director of STEM Curriculum Design, on a feature about the use of the Minecraft video game in K12 education.
03/20/2014 - 4:18am Due to advancement in cyber attack methodology, many companies are being encouraged to employ thorough security measures to combat the increasingly widespread attacks. This is evident in the release of cyber security frameworks such as the NIST Cyber Security Framework that was created from Presidential Executive Order 13636. For instance, utility companies, in particular, need to go beyond just guarding their networks at the edge, and begin protecting at deeper network levels as well. The current edge-based firewall approach, as well as the lack of widely deployed security protections in existing protocols, presents problems that require new, resilient and intelligent protection schemes.