generated by bibbase.org
  2019 (7)
Data Integrity Threat Model. Welch, V.; and Abhinit, I. Technical Report ScholarWorks, 6 2019.
Data Integrity Threat Model [link]Website   bibtex   abstract  
A Guide for Software Assurance for SWIP. Heiland, R.; Rynge, M.; Vahi, K.; Deelman, E.; and Welch, V. Technical Report 2019.
A Guide for Software Assurance for SWIP [pdf]Paper   A Guide for Software Assurance for SWIP [link]Website   bibtex   abstract  
Trusted CI Experiences in Cybersecurity and Service to Open Science. Adams, A.; Jackson, C.; Kiser, R.; Krenz, M.; Marsteller, J.; Miller, B., P.; Peisert, S.; Russell, S.; Sons, S.; Welch, V.; Zage, J.; Avila, K.; Basney, J.; Brunson, D.; Cowles, R.; Dopheide, J.; Fleury, T.; Heymann, E.; and Hudson, F. In Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19), pages 1-8, 2019. Association for Computing Machinery (ACM)
Trusted CI Experiences in Cybersecurity and Service to Open Science [pdf]Paper   bibtex   abstract  
Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences. Rynge, M.; Poehlman, W., L.; Feltus, F., A.; Vahi, K.; Deelman, E.; Mandal, A.; Baldin, I.; Bhide, O.; Heiland, R.; Welch, V.; and Hill, R. In Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19), pages 1-8, 2019. Association for Computing Machinery (ACM)
Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences [pdf]Paper   bibtex   abstract  
Initial Thoughts on Cybersecurity And Reproducibility. Deelman, E.; Stodden, V.; Taufer, M.; and Welch, V. In Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS '19), pages 13-15, 2019. Association for Computing Machinery (ACM)
Initial Thoughts on Cybersecurity And Reproducibility [pdf]Paper   bibtex   abstract  
Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows. Chapp, D.; Rorabaugh, D.; Brown, D., A.; Deelman, E.; Vahi, K.; Welch, V.; and Taufer, M. In Proceedings of the 2nd International Workshop on Practical Reproducible Evaluation of Computer Systems - P-RECS '19, pages 1-6, 2019. ACM Press
Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows [pdf]Paper   Applicability Study of the PRIMAD Model to LIGO Gravitational Wave Search Workflows [link]Website   bibtex   abstract  
  2018 (2)
Trusted CI Annual Report for 2018. Adams, A.; Avila, K.; Atkins, J.; Basney, J.; Bohland, L.; Borecky, D.; Cowles, R.; Dopheide, J.; Fleury, T.; Harbour, G.; Heymann, E.; Hudson, F.; Jackson, C.; Kiser, R.; Krenz, M.; Marsteller, J.; Miller, B.; Raquel, W.; Ruff, P.; Russell, S.; Shah, Z.; Shankar, A.; Sons, S.; Welch, V.; and Zage, J. Technical Report 2018.
Trusted CI Annual Report for 2018 [pdf]Paper   Trusted CI Annual Report for 2018 [link]Website   bibtex  
The Report of the 2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Andrew Adams, Jeannette Dopheide, Mark Krenz, James Marsteller, V., W.; and and John Zage Technical Report 2018.
The Report of the 2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure [link]Website   bibtex  
  2017 (7)
The Rise of Cybersecurity and Its Impact on Data Protection. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 7(2): 73-75. 2017.
bibtex  
Pervasive Technology Institute Annual Report: Research Innovations and Advanced Cyberinfrastructure Services in Support of IU Strategic Goals During FY 2017. Stewart, C.; Plale, B.; Welch, V.; Pierce, M.; Fox, G., C.; Doak, T., G.; Hancock, D., Y.; Henschel, R.; Link, M., R.; and Miller, T. Technical Report 2017.
Pervasive Technology Institute Annual Report: Research Innovations and Advanced Cyberinfrastructure Services in Support of IU Strategic Goals During FY 2017 [link]Website   bibtex  
The medical science DMZ: a network design pattern for data-intensive medical science. Peisert, S.; Dart, E.; Barnett, W.; Balas, E.; Cuff, J.; Grossman, R., L.; Berman, A.; Shankar, A.; and Tierney, B. Journal of the American Medical Informatics Association. 2017.
bibtex  
Bulk Collection: Systematic Government Access to Private-Sector Data. Cate, F., H.; and Dempsey, J., X. Oxford University Press, 2017.
bibtex  
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity. Peisert, S.; and Welch, V. IEEE Security and Privacy, 15(5): 94-95. 2017.
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity [link]Website   bibtex   abstract  
Indiana University Pervasive Technology Institute. Stewart, C., A.; Welch, V.; Plale, B.; Fox, G., C.; Pierce, M.; and Sterling, T. Technical Report 2017.
bibtex  
Machine Learning with Personal Data: Is Data Protection Law Smart Enough to Meet the Challenge?. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 7(1): 1-2. 2017.
bibtex  
  2016 (9)
Modeling the Past and Future of Identity Management for Scientific Collaborations. Cowles, R.; Jackson, C.; and Welch, V. In Proceedings of the International Symposium on Grids and Clouds (ISGC) 2016. 13-18 March 2016. Academia Sinica, Taipei, Taiwan. Online at http://pos. sissa. it/cgi-bin/reader/conf. cgi? confid= 270, id. 14, 2016.
bibtex  
A Time of Turmoil. Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynsky, O.; and Millard, C. International Data Privacy Law, 6(1): 1-3. 2016.
bibtex  
SciGaP-CTSC Engagement Summary. Heiland, R.; Koranda, S.; and Welch, V. Technical Report 2016.
bibtex  
The Language of Data Privacy Law (and How It Differs from Reality). Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 4(1): 259-269. 2016.
bibtex  
Center for Trustworthy Scientific Cyberinfrastructure-The NSF Cybersecurity Center of Excellence: Year One Report. Welch, V. Technical Report 2016.
bibtex  
PKI-ASAF Design Documents. Welch, V.; Heiland, R.; Garrison III, W., C.; and Lee, A., J. Technical Report 2016.
bibtex  
The Global Data Protection Implications of" Brexit". Cate, F., H.; Kuner, C.; Svantesson, D., J., B.; Lynskey, O.; and Millard, C. International Data Privacy Law, 6(3): 167-169. 2016.
bibtex  
The Report of the 2016 Cybersecurity Summit for Large Facilities and Cyberinfrastructure: Strengthening Trustworthy Science. Marsteller, J.; Welch, V.; and Starzynski Coddens, A. Technical Report 2016.
bibtex  
The Medical Science DMZ. Peisert, S.; Barnett, W.; Dart, E.; Cuff, J.; Grossman, R., L.; Balas, E.; Berman, A.; Shankar, A.; and Tierney, B. Journal of the American Medical Informatics Association, 23(6): 1199-1201. 2016.
bibtex  
  2015 (12)
Protecting Privacy in Big Data. Cate, F., H. Journal of Law and Economic Regulation, 8(1): 7-20. 2015.
bibtex  
Authentication and Authorization Considerations for a Multi-tenant Service. Heiland, R.; Koranda, S.; Marru, S.; Pierce, M.; and Welch, V. In Proceedings of the 1st Workshop on The Science of Cyberinfrastructure Research, Experience, Applications and Models - SCREAM '15, pages 29-35, 2015. ACM Press
Authentication and Authorization Considerations for a Multi-tenant Service [link]Website   bibtex   abstract  
Facilitating Scientific Collaborations by Delegating Identity Management. Cowles, R.; Jackson, C.; and Welch, V. In Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security - CLHS '15, pages 15-19, 2015. ACM Press
Facilitating Scientific Collaborations by Delegating Identity Management [link]Website   bibtex   abstract  
Internet Balkanization Gathers Pace: Is Privacy the Real Driver?. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5(1): 1-2. 2015.
bibtex  
Risk Management in Data Protection. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5(2): 95-98. 2015.
bibtex  
Center for Applied Cybersecurity Research: 2015 Annual Report and Strategic Plan (2015-2020). Delaney, D., G.; Welch, V.; and Starzynski Coddens, A. Technical Report 2015.
bibtex  
The Data Protection Credibility Crisis. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 5: 3. 2015.
bibtex  
XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations. Cowles, R.; Jackson, C.; and Welch, V. Technical Report Indiana University, 9 2015.
XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations [link]Website   bibtex  
Sustained software for cyberinfrastructure - Analyses of successful efforts with a focus on NSF-funded software. Stewart, C.; Barnett, W.; Wernert, E.; Wernert, J.; Welch, V.; and Knepper, R. In SCREAM 2015 - Proceedings of the 2015 Workshop on the Science of Cyberinfrastructure: Research, Experience, Applications and Models, Part of HPDC 2015, 2015.
bibtex   abstract  
Cyberinfrastructure resources enabling creation of the loblolly pine reference transcriptome. Wu, L.; Ganote, C., L.; Doak, T., G.; Barnett, W.; Mockaitis, K.; and Stewart, C., A. In Proceedings of the 2015 XSEDE Conference on Scientific Advancements Enabled by Enhanced Cyberinfrastructure - XSEDE '15, volume 2015-July, pages 1-6, 7 2015. ACM Press
Cyberinfrastructure resources enabling creation of the loblolly pine reference transcriptome [link]Website   bibtex   abstract  
Pervasive Technology Institute annual report: Research innovations and advanced cyberinfrastructure services in support of IU strategic goals during FY 2015. Stewart, Craig A.; Plale, Beth; Welch, Von; Link, Matthew R.; Miller, Therese; Wernert, Eric A.; Boyles, Michael J.; Fulton, Ben; Hancock, David Y.; Henschel, Robert; Michael, Scott A.; Pierce, Marlon; Ping, Robert J.; Gniady, Tassie; Fox, Geoffrey C.; Mi, G. Technical Report 2015.
Pervasive Technology Institute annual report: Research innovations and advanced cyberinfrastructure services in support of IU strategic goals during FY 2015 [pdf]Paper   Pervasive Technology Institute annual report: Research innovations and advanced cyberinfrastructure services in support of IU strategic goals during FY 2015 [link]Website   bibtex  
  2014 (14)
Sustainability of cyberinfrastructure software: Community needs, case studies, and success strategies. Stewart, C., A.; Barnett, W., K.; Wernert, E., A.; Wernert, J., A.; Welch, V.; and Knepper, R. Technical Report 2014.
bibtex  
Taking Stock After Four Years. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 4(2). 2014.
bibtex  
The Case for an Open and Evolving Software Assurance Framework. Livny, M.; Miller, B., P.; and Welch, V. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP), pages 1, 2014. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)
bibtex  
Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure Large Facility Cybersecurity Challenges and Responses August 26‐August 28. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex  
Globus Data Sharing: Security Assessment. Heiland, R.; Koranda, S.; and Welch, V. Technical Report 2014.
bibtex  
When Two Worlds Collide: The Interface Between Competition Law and Data Protection. Cate, F., H.; Kuner, C.; Millard, C.; Svantesson, D., J., B.; and Lynskey, O. International Data Privacy Law, 4(4): 247-248. 2014.
bibtex  
The role of the collaboratory in enabling large-scale identity management for HEP. Cowles, R.; Jackson, C.; and Welch, V. Journal of Physics: Conference Series, 513(TRACK 3). 2014.
The role of the collaboratory in enabling large-scale identity management for HEP [link]Website   bibtex   abstract  
A model for identity management in future scientific collaboratories. Cowles, R.; Jackson, C.; Welch, V.; and Cholia, S. In Proceedings of Science, volume 23-28-Marc, 2014. Proceedings of Science (PoS)
A model for identity management in future scientific collaboratories [link]Website   bibtex   abstract  
Systematic Government Access to Private-Sector Data Redux. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2014.
bibtex  
OSG PKI transition: Experiences and lessons learned. Welch, V.; Deximo, A.; Hayashi, S.; Khadke, V., D.; Mathure, R.; Quick, R.; Altunay, M.; Sehgal, C., S.; Tiradani, A.; and Basney, J. In Proceedings of Science, volume 23-28-Marc, 2014. Proceedings of Science (PoS)
OSG PKI transition: Experiences and lessons learned [link]Website   bibtex   abstract  
Report of the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex  
Report of the 2013 NSF Cybersecurity Summit for Cyberinfrastructure and Large Facilities: Designing Cybersecurity Programs in Support of Science. Jackson, C.; Marsteller, J.; and Welch, V. Technical Report 2014.
bibtex  
The (Data Privacy) Law Hasn't Even Checked in When Technology Takes Off. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 4(3): 175-176. 2014.
bibtex  
Building a data sharing model for global genomic research. Kosseim, P.; Dove, E., S.; Baggaley, C.; Meslin, E., M.; Cate, F., H.; Kaye, J.; Harris, J., R.; and Knoppers, B., M. Genome biology, 15(8): 430. 2014.
bibtex  
  2013 (13)
PRISM and Privacy: Will This Change Everything?. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 3(4): 217-219. 2013.
bibtex  
The Business of Privacy. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2013.
bibtex  
CyberGIS-CTSC Engagement Final Report. Butler, R.; Fleury, T.; Marsteller, J.; and Welch, V. Technical Report 2013.
bibtex  
Data protection principles for the 21st century. Cate, F., H.; Cullen, P.; and Mayer-Schonberger, V. Microsoft Corporaton, 2013.
bibtex  
Identity management factors for HEP virtual organizations. Cowles, R.; Jackson, C.; and Welch, V. In 20th International Conference on Computing in High Energy and Nuclear Physics (CHEP2013), 2013.
bibtex  
Face-to-Data--Another Developing Privacy Threat?. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law. 2013.
bibtex  
Science gateway security recommendations. Basney, J.; and Welch, V. In Proceedings - IEEE International Conference on Cluster Computing, ICCC, 2013.
Science gateway security recommendations [link]Website   bibtex   abstract  
Status, Strategies and Future Plans-OSG PKI Transition. Welch, V. Technical Report 2013.
bibtex  
Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure. Welch, V. Technical Report Indiana University, 10 2013.
Year 1 Report: Center for Trustworthy Scientific Cyberinfrastructure [link]Website   bibtex   abstract  
The Extraterritoriality of Data Privacy Laws--An Explosive Issue Yet to Detonate. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 3(3): 147-148. 2013.
bibtex  
HIPAA and Advanced Scientific Computing. Shankar, A.; and Barnett, W. Technical Report 2013.
bibtex  
Notice and Consent in a World of Big Data. Cate, F., H.; and Mayer-Schonberger, V. International Data Privacy Law, 3: 67-73. 2013.
Notice and Consent in a World of Big Data [link]Website   bibtex  
Identity Management for Virtual Organizations: An Experience-Based Model. Cowles, R.; Jackson, C.; and Welch, V. In 2013 IEEE 9th International Conference on e-Science, pages 278-284, 10 2013. IEEE
Identity Management for Virtual Organizations: An Experience-Based Model [link]Website   bibtex   abstract  
  2012 (9)
Globus Online Security Review. Welch, V. Technical Report 2012.
bibtex  
OSG Certificate Authority Implementation Plan. Welch, V. Technical Report 2012.
bibtex  
PRIVACY, CONSUMER CREDIT, AND THE. Cate, F., H. The Impact of Public Policy on Consumer Credit,229. 2012.
bibtex  
The commodification of information and the control of expression. Cate, F., H. Amicus Curiae, 2002(43): 3-7. 2012.
bibtex  
The Supreme Court and information privacy. Cate, F., H.; and Cate, B., E. International Data Privacy Law, 2(4): 255-267. 2012.
bibtex  
Security at the Cyber Border: Exploring Cybersecurity for International Research Network Connections. Welch, V.; Pearson, D.; Tierney, B.; and Williams, J. Technical Report 2012.
bibtex  
The End of the Beginning. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 2(3): 115-116. 2012.
bibtex  
The Intricacies of Independence. Cate, F., H.; Kuner, C.; Millard, C.; and Svantession, D., J., B. International Data Privacy Law, 2(1): 1-2. 2012.
bibtex  
OSG DigiCert Pilot Report. Altunay, M.; Basney, J.; Fischer, J.; Sehgal, C.; and Welch, V. Technical Report 2012.
bibtex  
  2011 (13)
A roadmap for using NSF cyberinfrastructure with InCommon. Barnett, W.; Welch, V.; Walsh, A.; and Stewart, C., A. Technical Report 2011.
A roadmap for using NSF cyberinfrastructure with InCommon [link]Website   bibtex  
Cyberinfrastructure Usage Modalities on the TeraGrid. Katz, D., S.; Hart, D.; Jordan, C.; Majumdar, A.; Navarro, J.; Smith, W.; Towns, J.; Welch, V.; and Wilkins-Diehr, N. In Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum (IPDPSW '11), pages 932-939, 5 2011. IEEE
Cyberinfrastructure Usage Modalities on the TeraGrid [link]Website   bibtex   abstract  
Indiana University's Advanced Cyberinfrastructure. Arenson, A.; Boyles, M.; Cruise, R.; Gopu, A.; Hart, D.; Lindenlaub, P.; Papakhian, M.; Samuel, J.; Seiffert, K.; and Shankar, A. Technical Report 2011.
bibtex  
Let's Not Kill All the Privacy Laws (and Lawyers). Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(4). 2011.
bibtex  
A Roadmap for Using NSF Cyberinfrastructure with InCommon: Abbreviated Version. Barnett, W.; Welch, V.; Walsh, A.; and Stewart, C., A. Technical Report 2011.
bibtex  
A Transatlantic Convergence on Privacy?. Cate, F., H. IEEE Security & Privacy, 9(1): 76-79. 2011.
bibtex  
Report of NSF Workshop Series on Scientific Software Security Innovation Institute. Butler, R.; Welch, V.; Basney, J.; Koranda, S.; Barnett, W., K.; and Pearson, D. Technical Report 2011.
bibtex  
Moving Forward Together. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(2): 81-82. 2011.
bibtex  
Privacy--An Elusive Concept. Cate, F., H.; Kuner, C.; Millard, C.; and Svantesson, D., J., B. International Data Privacy Law, 1(3). 2011.
bibtex  
Overview of NSF ACCI Task Force on Campus Bridging Report. Stewart, C., A.; and Welch, V. Technical Report 2011.
bibtex  
Campus Bridging: Software & Software Service Issues Workshop Report. McGee, J.; Welch, V.; and Almes, G., T. Technical Report 2011.
bibtex  
An analysis of the benefits and risks to LIGO when participating in identity federations. Basney, J.; Koranda, S.; and Welch, V. LIGO document number LIGOG1100964v2, September. 2011.
bibtex  
A roadmap for using NSF cyberinfrastructure with InCommon. Welch, V.; Walsh, A.; Barnett, W.; and Stewart, C., A. In Proceedings of the 2011 TeraGrid Conference on Extreme Digital Discovery - TG '11, pages 1, 2011. ACM Press
A roadmap for using NSF cyberinfrastructure with InCommon [link]Website   bibtex   abstract  
  2010 (3)
The limits of notice and choice. Cate, F., H. IEEE Security & Privacy, 8(2). 2010.
bibtex  
Protecting privacy in health research: the limits of individual choice. Cate, F., H. California Law Review,1765-1803. 2010.
bibtex  
Workflows for parameter studies of multi-cell modeling. Heiland, R.; Swat, M.; Zaitlen, B.; Glazier, J.; and Lumsdaine, A. In Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim '10, pages 1, 2010. ACM Press
Workflows for parameter studies of multi-cell modeling [link]Website   bibtex   abstract  
  2009 (3)
Updating Data Protection: Part I--Identifying the Objectives. Cate, F., H. Published by the Centre for Information Policy Leadership. 2009.
bibtex  
Security, privacy, and the role of law. Cate, F., H. IEEE Security & Privacy, 7(5). 2009.
bibtex  
Dos and Don'ts of Data Breach and Information Security Policy. Cate, F., H.; Abrams, M., E.; Bruening, P., J.; and Swindle, O. Published by the Centre for Information Policy Leadership. 2009.
bibtex  
  2008 (1)
TeraGrid: Analysis of organization, system architecture, and middleware enabling new types of applications. Catlett, C.; Allcock, W., E.; Andrews, P.; Aydt, R.; Bair, R.; Balac, N.; Banister, B.; Barker, T.; Bartelt, M.; Beckman, P.; Berman, F.; Bertoline, G.; Blatecky, A.; Boisseau, J.; Bottum, J.; Brunett, S.; Bunn, J.; Butler, M.; Carver, D.; Cobb, J.; Cockerill, T.; Couvares, P.; Dahan, M.; Diehl, D.; Dunning, T.; Foster, I.; Gaither, K.; Gannon, D.; Goasguen, S.; Grobe, M.; Hart, D.; Heinzel, M.; Hempel, C.; Huntoon, W.; Insley, J.; Jordan, C.; Judson, I.; Kamrath, A.; Karonis, N.; Kesselman, C.; Kovatch, P.; Lane, L.; Lathrop, S.; Levine, M.; Lifka, D.; Liming, L.; Livny, M.; Loft, R.; Marcusiu, D.; Marsteller, J.; Martin, S.; McCaulay, S.; McGee, J.; McGinnis, L.; McRobbie, M.; Messina, P.; Moore, R.; Moore, R.; Navarro, J.; Nichols, J.; Papka, M.; Pennington, R.; Pike, G.; Pool, J.; Reddy, R.; Reed, D.; Rimovsky, T.; Roberts, E.; Roskies, R.; Sanielevici, S.; Scott, J.; Shankar, A.; Sheddon, M.; Showerman, M.; Simmel, D.; Singer, A.; Skow, D.; Smallen, S.; Smith, W.; Song, C.; Stevens, R.; Stewart, C.; Stock, R.; Stone, N.; Towns, J.; Urban, T.; Vildibill, M.; Walker, E.; Welch, V.; Wilkins-Diehr, N.; Williams, R.; Winkler, L.; Zhao, L.; and Zimmerman, A. Volume 16 2008.
TeraGrid: Analysis of organization, system architecture, and middleware enabling new types of applications [link]Website   bibtex   abstract  
  2006 (1)
The introduction of the OSCAR database API (ODA). Kim, D.; Squyres, J., M.; and Lumsdaine, A. In High-Performance Computing in an Advanced Collaborative Environment, 2006. HPCS 2006. 20th International Symposium on, pages 39, 2006. IEEE
bibtex  
  2005 (1)
Revamping the OSCAR database: A flexible approach to cluster configuration data management. Kim, D.; Squyres, J., M.; and Lumsdaine, A. In High Performance Computing Systems and Applications, 2005. HPCS 2005. 19th International Symposium on, pages 326-332, 2005. IEEE
bibtex  
  2003 (2)
University Information Technology Services' Advanced IT Facilities: The least every researcher needs to know. Cruise, R.; Hart, D.; Papakhian, M.; Repasky, R.; Samuel, J.; Shankar, A.; Stewart, C., A.; and Wernert, E. Technical Report 2003.
bibtex  
2003 Report on Indiana University Accomplishments supported by Shared University Research Grants from IBM, Inc. Stewart, C., A.; Papakhian, M.; Hart, D.; Shankar, A.; Arenson, A.; McMullen, D., F.; Palakal, M.; Dalkilic, M.; and Ortoleva, P. Technical Report 2003.
bibtex  
  2002 (1)
INGEN's advanced IT facilities: The least you need to know. Cruise, R.; Hart, D.; Papakhian, M.; Repasky, R.; Samuel, J.; Shankar, A.; Stewart, C., A.; and Wernert, E. Technical Report 2002.
bibtex  
  2000 (1)
Research and Academic Computing Implementation Plan. Peebles, C., S.; Stewart, C., A.; Bernbom, G.; McMullen, D., F.; Shankar, A.; Samuel, J.; Daniels, J.; Papakhian, M.; Hart, D.; and Walsh, J. Technical Report 2000.
bibtex