8,924 research outputs found
Advanced Cyberinfrastructure for Science, Engineering, and Public Policy
Progress in many domains increasingly benefits from our ability to view the
systems through a computational lens, i.e., using computational abstractions of
the domains; and our ability to acquire, share, integrate, and analyze
disparate types of data. These advances would not be possible without the
advanced data and computational cyberinfrastructure and tools for data capture,
integration, analysis, modeling, and simulation. However, despite, and perhaps
because of, advances in "big data" technologies for data acquisition,
management and analytics, the other largely manual, and labor-intensive aspects
of the decision making process, e.g., formulating questions, designing studies,
organizing, curating, connecting, correlating and integrating crossdomain data,
drawing inferences and interpreting results, have become the rate-limiting
steps to progress. Advancing the capability and capacity for evidence-based
improvements in science, engineering, and public policy requires support for
(1) computational abstractions of the relevant domains coupled with
computational methods and tools for their analysis, synthesis, simulation,
visualization, sharing, and integration; (2) cognitive tools that leverage and
extend the reach of human intellect, and partner with humans on all aspects of
the activity; (3) nimble and trustworthy data cyber-infrastructures that
connect, manage a variety of instruments, multiple interrelated data types and
associated metadata, data representations, processes, protocols and workflows;
and enforce applicable security and data access and use policies; and (4)
organizational and social structures and processes for collaborative and
coordinated activity across disciplinary and institutional boundaries.Comment: A Computing Community Consortium (CCC) white paper, 9 pages. arXiv
admin note: text overlap with arXiv:1604.0200
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI
project, funded by the US National Science Foundation to serve the community as
the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address
cybersecurity for the open science community through a single organization that
provides leadership, training, consulting, and knowledge to that community. The
article describes the experiences and lessons learned of Trusted CI regarding
both cybersecurity for open science and managing the process of providing
centralized services to a broad and diverse community.Comment: 8 pages, PEARC '19: Practice and Experience in Advanced Research
Computing, July 28-August 1, 2019, Chicago, IL, US
An Investigation of Cyberinfrastructure Adoption in University Libraries
This study aims to understand factors that affect university libraries’ adoption of cyberinfrastructure for big data sharing and reuse. A cyberinfrastructure adoption model which contains 10 factors has been developed based on the technology-organization-environment (TOE) framework and the literature regarding tradeoffs of applying cyberinfrastructure. This paper describes the proposed cyberinfrastructure adoption model and explains the survey in-struments. The next steps of the study are also presented
What is Cyberinfrastructure?
Cyberinfrastructure is a word commonly used but lacking a single, precise definition. One recognizes intuitively the analogy with infrastructure, and the use of cyber to refer to thinking or computing – but what exactly is cyberinfrastructure as opposed to information technology infrastructure? Indiana University has
developed one of the more widely cited definitions of cyberinfrastructure:
"Cyberinfrastructure consists of computing systems, data storage systems, advanced instruments and data repositories, visualization environments, and people, all linked together by software and high performance networks to improve research productivity and enable breakthroughs not otherwise possible." A second definition, more inclusive of scholarship generally and educational activities, has also been published and is useful in describing cyberinfrastructure: "Cyberinfrastructure consists of systems, data and information management, advanced instruments, visualization environments, and people, all linked together by software and advanced networks to improve scholarly productivity and enable knowledge breakthroughs and discoveries not otherwise possible." In this paper, we describe the origin of the term cyberinfrastructure based on the history of the root word infrastructure, discuss several terms related to cyberinfrastructure, and provide several examples of cyberinfrastructure
Capturing the "Whole Tale" of Computational Research: Reproducibility in Computing Environments
We present an overview of the recently funded "Merging Science and
Cyberinfrastructure Pathways: The Whole Tale" project (NSF award #1541450). Our
approach has two nested goals: 1) deliver an environment that enables
researchers to create a complete narrative of the research process including
exposure of the data-to-publication lifecycle, and 2) systematically and
persistently link research publications to their associated digital scholarly
objects such as the data, code, and workflows. To enable this, Whole Tale will
create an environment where researchers can collaborate on data, workspaces,
and workflows and then publish them for future adoption or modification.
Published data and applications will be consumed either directly by users using
the Whole Tale environment or can be integrated into existing or future domain
Science Gateways
- …