|HOME | AGENDA | REGISTRATION | FAQ|
2005 Private Sector Program Annual Meeting Abstracts
This seminar is targeted at technical people interested in learning more about the current state of the art in reconfigurable computing. In this seminar, we present an overview of the experimental reconfigurable systems installed at NCSA, and of Field Programmable Gate Arrays (FPGAs)the enabling technology for reconfigurable computing. We also present the lessons we have learned from our experiences porting scientific applications to these machines.
In our research, we address the problem of three-dimensional volume reconstruction in medical domain. 3D volume data are acquired from multiple cross sections of a tissue specimen by (a) placing each cross section under a fluorescent confocal laser scanning microscope (CLSM), and (b) moving a specimen under the CLSM to obtain an image stack per cross section and per specimen location. Our work includes (1) image pre-processing, such as, noise filtering, automatic mosaicking, and adjustment of spatial intensity heterogeneity, (2) support for decision making on registration methods using simulations and acquired data analysis, (3) registration of image volumes using the outcomes of decision making, (4) 3D volume reconstruction using Web services for remote collaboration purposes, (5) surface and volumetric analysis of 3D segments and (6) 3D volume visualization. We present our preliminary results from the on-going research conducted in collaboration with the Department of Pathology, College of Medicine at the University of Illinois at Chicago funded by the National Institute of Health (NIH).
At the NCSA CAVE we will be demonstrating virtual reality applications that have been developed through collaborations with industry, research scientists, University of Illinois students, and VR programmers from collaborating institutions.
The CLEANER (Collaborative Large-Scale Engineering Analysis Network for Environmental Research) project is a tool that provides the community access to data, and computational resources, shared by geographically-distributed investigators and supported by cyberinfrastructure (a system of computers, digital data, networks, algorithms, and collaboration tools that supports geographically distributed teams of researchers and educators). This project demonstrates a collaborative, community-based process supported by state-of-the-art information technology called the CyberCollaboratory. D2K Web Service are being used to provide the analytical support.
The D2K Web Service enables any type of application, Web-based or otherwise, to execute D2K Itineraries from any location, on any platform, using any programming language. This is achieved by leveraging industry standard XML-based technologies that describe and communicate with D2K. In addition to abstracting the D2K execution engine, by acting as a broker to D2K Servers, the D2K Web Service allows users to process computationally-intensive jobs on machines with more processors or more memory than their desktop machine. We will demonstrate several projects that are built on top of the D2K Web Service, (Phylomat, Evolution Highway, and UIC 3D Medical Volume Reconstruction and Analysis).
EWB offers the notion of a Web browser with an "edit" button. Browse to a page you have permission to modify and the edit button lights up. Clicking the edit button allows you to edit the page right inside the browser window. Rather than relying on a webmaster to make changes or post content, authorized users can now create and maintain a website or particular Web pages themselves. Tasks such as adding new pages, correcting typos, and updating time sensitive information can be performed in the Web-browser environment with which they are already familiar, using a what you see is what you get interface. EWB can be used to create Web pages from scratch, providing a friendly interface for users who are not tech savvy. EWB also seamlessly integrates with Microsoft Office, allowing Word, Excel, and Powerpoint documents to be posted to the Web and edited just like Web pages.
This demo will show several state-of-the-art Internet security visualizations including visualizations of security on Enterprise networks, high performance computing clusters, and storage systems.
Invisibase does for databases what the Editable Web Browser did for Web pages. Users with little or no database knowledge can create Web-accessible databases and easily populate and search them. Users can select the field types-text, numbers, dates, images, etc - naming them and easily uploading the relevant content. Most currently available Web-based database creation tools require the user to design and manage both the database and a set of HTML pages for accessing that database. This software provides a database with built-in Web support, allowing one-click creation of search and browse pages. Conversely, the user can choose to create their own HTML code by hand or by using the Editable Web Browser as an advanced option for presenting the database.
The Knowledge Center is an integrated environment containing vital tools for building and maintaining geographically distributed communities of practice. The Centers are built upon research from three highly related domainsKnowledge Management, Social Networking, and e-Learningand are designed to promote best practices from each of these fields. Among the tools available within the various Knowledge Center systems are:
Search technologies is one of the fastest changing and most competitive aspects of the Internet today. KLSG's search customization and visualization tool takes a user-centric approach to information retrieval and knowledge acquisition. Unlike existing search engines that generate identical results for all users who search upon the same term, KLSG's search tool allows users to (a) impose their own preferences on the returned search results and (b) quickly filter returned documents to located items of interest to them.
KLSG's search customization and visualization tool combines innovative approaches in Web crawler design, document indexing, information retrieval querying, and collaborative filtering to build this customizable, holistic search engine. Currently in prototype form, this new tool will deployed in KLSG's flagship product, the Knowledge Center, and will serve as one of the tools in the Extensible Brain toolset as it evolves. What's the Extensible Brain, you ask? Stop by our demonstrations and ask us.
MAEViz is a tool that integrates spatial information, data and visual information into an environment for performing seismic loss assessment and analysis. MAEViz follows the Consequence Based Engineering methodology using a visually based, menu-driven system to generate damage projections from scientific and engineering principles, test multiple mitigation strategies, and support modeling efforts to estimate higher level impacts of earthquake hazards, such as impacts on transportation networks, social, or economic systems. MAEViz is built upon D2K software framework as a D2K Driven Application. MAEViz is a collaboration project with the Mid-America Earthquake Center in the Department of Civil Engineering.
MIR project will demonstrate a set of analytical procedures applied to large scale collections of music audio and metadata in order to apply state-of-the-art data mining techniques. The procedures include frequency-domain transformation, event-based decomposition of audio streams and a variety of classification and prediction techniques. The M2K (Music to Knowledge) framework is a new extension of the D2K environment, which was chosen to provide M2K with an advanced dataflow programming environment and cross-machine, cross-platform, parallelism.
Phantasm is a cutting-edge multimedia cataloging and management system designed from the ground up to address the needs of large-scale professional media repositories. It combines advanced cataloging technologies with autonomous ranking and management systems and a novel rights-management suite. These technologies operate in concert in the Phantasm system, showcasing a tour-de-force of media management technologies. Phantasm is currently used to manage the UIPhotos collection, a set of more than 50,000 images covering the whole of the UIUC campus. Phantasm technologies make it possible to make a collection this size available and yet still make it possible to find specific images and handle rights management.
Reconfigurable systems research and applications research topics at NCSA are presented in a poster style format.
Supporting Decision Making Processes Based on Geographic Information
Many decision making processes are based on large size geospatial images, region boundaries and sample measurements. While various decisions use geospatial data and span a large range of applications, mathematical models and software tools that enable (a) processing heterogeneous geospatial images, boundary files and tabular information, and (b) archiving decision making processes are of great need to decision makers and archivists. In our research, we address the problems of (1) large size image data handling (storage and information retrieval), (2) feature extraction, (3) heterogeneous geospatial data integration (mosaicking, georeferencing, spatial and temporal resolutions), (4) spatial and temporal prediction modeling, and (5) visualization of the obtained results. Furthermore, we research software tools and high-performance computing solutions for gathering, archiving and analyzing information about decision making processes so that a decision making process can be documented and reconstructed in future. Our demonstration will show prototype solutions in the context of hydrological prediction modeling. We present our preliminary results from the on-going research conducted in collaboration with the Civil and Environmental Engineering Department at UIUC. Parts of the research are funded by the National Archives and Administration Records (NARA) and the National Aeronautics and Space Administration (NASA).
Text Analytics project will demonstrate text mining and visualization system that combines text parsing to formulate and extract entities, events, and relationships with the latest in stream graph mining research to find hidden event patterns and predict relationships between patterns across large and heterogeneous textual information flows. The visualizations will allow exploration, discovery, and monitoring of event patterns. We will demonstrate this application on data from recent Web crawls. The text components are called T2K and are written as components in the D2K environment.
The scalable tiled display wall is one of the highest-resolution displays in existence. The current configuration is a 40-projector system driven by a cluster of 40 PCs, resulting in one logical display with a resolution of 8,192 x 3,840 pixels.
While considering all existing hazards for humans due to (a) natural disastrous events, (b) failures of human hazard attention or (c) intentional harmful behaviors of humans, we address the problem of building hazard aware spaces (HAS) to alert innocent people. We have researched and developed components of a prototype HAS system using a robot for sensor deployment, wireless "smart" micro electro-mechanical systems (MEMS) sensors, such as, the MICA sensors, and spectral cameras, for instance, thermal infrared (IR), visible spectrum and multi-spectral cameras. Within this context, our prototype system of HAS provides scientific solutions to (1) remote control of a robot for sensor deployment, (2) localization of sensors and objects, (3) synchronization of sensors and cameras, (4) calibration of spectral cameras and sensors, (5) proactive camera control, (6) hazard detection, (7) human alert, (8) hazard confirmation, and (9) hazard understanding and containment. The work presented includes also theoretical and practical limitations that have to be understood when working with novel technologies. The research has been funded by the National Center for Advanced Secure Systems Research (NCASSR).
The National Center for Supercomputing Applications presents VIAS, a domain specific information retrieval, archival, and processing system. Specifically designed to provide continually updated information on highly dynamic topics, VIAS is ideally suited for use with volatile information sources like the World Wide Web. It continually crawls the Web, monitors mailing lists and USENET newsgroups, and archives all of the information it finds on its topics of interest. However, VIAS goes beyond simple archival of the knowledge it finds, to the autonomous generation of new knowledge and automatic categorization of existing knowledge. A library of state-of-the-art proprietary metadata algorithms is continuously executed against the archives, providing a rich source of new knowledge to be queried or viewed in realtime. VIAS provides the ideal platform for market research and competitive intelligence tasks.
Visual Analytics will demonstrate several of the latest algorithms for graph mining and sequence mining. Graph mining is looking for frequent patterns that occur in network graphs. We will illustrate how patterns can be detected in graph mining, such as social networks. Sequential pattern matching, which discovers frequent subsequences as patterns in a sequence database, is an important data mining problem with broad applications. These include the analysis of customer purchase patterns, the analysis of DNA, and the analysis of sequenced or time-related processes such as those found in scientific experiments, natural disasters, and disease treatments. These algorithms were designed by Dr. Jiawei Han's research group in the Computer Science Department and implemented as components in the D2K environment.
Exchange of private information content among a large number of users via E-mail List Services (or, mailing lists) is becoming increasingly common. In this talk we address security requirements in that setting and describe a new protocol SELSa Secure E-mail List Servicethat provides confidentiality, integrity, and authentication for e-mails exchanged via lists. In addition, SELS also protects against the use of lists for e-mail spamming. We are working on a prototype of SELS that will be integrated with multiple e-mail clients and the majordomo list server.
We all juggle multiple security credentials for accessing computer systems, such as Web site passwords and ATM cards. This talk will present ongoing work at NCSA examining the usability of different types of credentials, such as cryptographic key files, smartcards, and one-time password tokens, and our work developing open source online credential repository software to assist with credential management. I will discuss applications of our work in areas including grid computing and homeland security.
Security administration is a difficult task with human adversaries typically using automated scripts to probe and attack networked assets from both inside and out. There is no lack of data to trace these attacks but the high volume, high dimensionality, and continous streaming nature obscures attacks from human discovery. NCSA is leading the world in research to support human operators to administer Internet security in a variety of different domains. In this talk we will show security visualization tools NCSA has developed for logical IP address spaces, high performance clusters, and storage systems. These security visualization tools have the following in common: the communication of "situational awareness" to a human operator so cognitive processes can be used to identify patterns of interest. All of these security visualization tools will eventually be available for Internet download (some are already available). This work was supported in part by multiple research grants from Office of Naval Research.
CASI is a technology and services company delivering robust solutions for multiple industries since 1993. With offices in Champaign and Chicago, Illinois, and in Pune, India, we serve companies of all sizes around the globe.
CASI has been developing and licensing mission-critical solvers for solution of linear systems for over a decade. These are widely used in the areas of Engineering Analysis and VLSI Simulation. It is estimated that these solvers are used by over 70,000 users worldwide.
CASI's services group, based in Chicago, provides software and other consulting services. CASI's subisidiary in Pune, India provides engineering services, and software testing and development services.
Our emphasis is on building long term partnerships with customers so that we contribute to their continued success.
ChemSensing, Inc. (CSI) is a medical diagnostics company developing technology for point-of-care use to detect disease through analysis of exhaled breath. Through a combination of successful in-vitro studies, laboratory tests, and animal trials the company has developed sensors designed to detect: H. pylori (which causes peptic ulcers); stage 1 and 2 lung tumors; upper respiratory infections. The patented disposable sensor array responds with a color change that is measured by a device developed by the company with off-the-shelf electronics. Results come from software written by the company.
Chromatin, Inc. with operations in Chicago and Champaign-Urbana, develops and markets novel proprietary technology that enables entire chromosomes to be designed and incorporated into plant cells. This technology for the first time makes it possible to simultaneously introduce multiple genes into a plant cell while maintaining precise control of gene expression. Chromatin is employing these new genetic tools to design and market products that confer commercially valuable traits in plants, including improved nutritional and health characteristics, and uses in industrial, agricultural, and pharmaceutical product development.
iCyt Visionary Bioscience, Inc. is a rapidly growing professional services firm specializing in the design and engineering of high-throughput cell measurement instrumentation.
Renew Power is an innovative fuel cell company focused on the development and commercialization of energy conversion devices (ECDs) in the portable electronics marketplace. Our technology is based on formic acid as a direct fuel, a Direct Formic Acid Fuel Cell (DFAFC). The properties of formic acid allow for easier fuel cell design and engineering while providing approximately five times greater energy density than current batteries. Applications for our DFAFCs range from military devices to portable consumer electronics.
RiverGlass develops software that merges multiple data streams from disparate sources and applies powerful, real-time data analysis and modeling techniques that help customers manage risks, solve critical problems, and make informed decisions.
The Visbox company offers the VisBox, a turnkey projection-based VR system that incorporates head-tracking and 3D stereo display. The VisBox is a general-purpose VR system that can be used for a variety of applications. It is designed to be both affordable and user-friendly. Visbox also makes the VisWall, a scalable high-resolution display wall that is available in a variety of configurations depending on user needs. The VisWall display is achieved by the highly accurate alignment of multiple projectors. A complete VisBox system, including support and on-site installation, starts at under $50,000. The VisWall's cost varies according to the configuration.
Wolfram Research is the world's leading developer of computational software for science and technology, offering organization-wide computing solutions. Led by Mathematica, its flagship product, the company's software is relied on today by several million enthusiastic users around the world and has been the recipient of many industry awards. Wolfram Research was founded in 1987 by Stephen Wolfram, who continues to lead the company today. The company is headquartered in the United States, with offices in Europe and Japan. Go to http://www.wolfram.com/ for more information about Wolfram Research and its products.
Every site connected to the Internet sees hundreds to thousands of attacks daily. Whether they be automated attacks, or directed attacks against a site, everyone must be aware of the constant threat against their organization. NCSA's Jim Barlow is going to take a look at a recent case of directed attacks against research and educational institutions.
Information technology forms the lifeblood of the modern commercial world, connecting companies to the marketplace and fostering internal collaboration. While tremendous strides have been made towards making information technology more accessible, most companies still rely on a large IT department for even the simplest of tasks. Though companies often want to carefully control the content that reaches their external Web site, the need for a gatekeeper can often stifle internal collaboration and is a huge hurdle for small companies and organizations wanting to have a presence on the Web. We present a suite of tools that place the power of the Web in the hands of everyone, from research groups within a company wanting to collaborate internally, to a CEO who wants to be able to maintain the Web page of his local rotary club. Tools in the suite address the full range of online content creation from simple Web pages to full-fledged Web-based databases to massive-scale multimedia repositories, all with interfaces simple enough for anyone to be able to use. We also introduce a set of powerful analytical tools for leveraging the Web for competitive advantage.
Can your organization benefit from the latest research in visual analytics? This talk will feature developments in the field of visual analytics and other recent activities of the Automated Learning Group at NCSA under the direction of Michael Welge. The talk will give an overview of recently developed methods for streaming analytics, intelligent text mining, analytics in Web services, and the latest developments in analytics development tools.
While considering all existing hazards for humans due to (a) natural disastrous events, (b) failures of human hazard attention or (c) intentional harmful behaviors of humans, we address the problem of building hazard aware spaces (HAS) to alert innocent people. We have researched and developed components of a prototype HAS system for detecting fire using wireless "smart" micro electro-mechanical systems (MEMS) sensors, such as, the MICA sensors, and spectral cameras, for instance, thermal infrared (IR), visible spectrum and multi-spectral cameras. Within this context, my presentation overviews technical challenges and prototype scientific solutions to (1) robotic sensor deployment, (2) localization of sensors and objects, (3) synchronization of sensors and cameras, (4) calibration of spectral cameras and sensors, (5) proactive camera control, (6) hazard detection, (7) human alert, (8) hazard confirmation, and (9) hazard understanding and containment. The work presented will also include theoretical and practical limitations that have to be understood when working with novel technologies.
Although the term "reconfigurable computing" was coined in the 1960s, it is only recently that advances in enabling technologies have begun to allow the development of commercial experimental reconfigurable systems in the area of high performance computing. NCSA is heavily involved with application scientists, computer industry leaders, software developers and researchers dedicated to moving this technology past its current "bleeding-edge" status into a position of being a powerful and useful platform for high end computing and data analytics. This presentation is an overview of the state of the art of reconfigurable computing that closes with suggestions of the currently unrealized potential of this computing architecture.
Of all learned information within organizations, 90% is not shared. To compensate for this lack of transfer in knowledge and expertise, organizations spend in excess of $20 billion on training and $13.4 billion on knowledge management. NCSA's Knowledge & Learning Systems Group is researching and blending the best practices from e-Learning and Knowledge Management in order to build innovative knowledge sharing and collaboration environments.
During this presentation, KLSG staff members will share their knowledge about current and future technologies that facilitate the sharing of knowledge and acquisition of expertise. Among the technologies currently in use are portals, toolsets, simulations, Web services, data mining, and visualization. Within NCSA, many of these technologies are integrated within KLSG's Knowledge Center, our search customization and visualization tool, and the CLEANER CyberCollaboratoryeach of which will be discussed. Looking toward the future, KLSG staff will discuss the Extensible Brain. This futuristic project seeks to expand the capacity of human thought, learning, and collaboration. It does so by bringing together leading minds from diverse fields such as artificial intelligence, psychology, knowledge management, human computer interaction, machine learning, and education. The realization of the Extensible Brain will bring about a new age in information sharing and the acquisition of expertise.