Research Facilities

CLOUDSys: Cloud Systems Lab

The CloudSys lab aims to conduct transformative research at the synergistic intersection of Cloud Computing, Edge Computing, Big Data and Cyber Security.

Location: NPB 2.236
Investigator: Lama, Palden

Advanced, Sustainable, and Intelligent Computer System (ASIC) Laboratory

Our research focuses on software and hardware co-design of efficient, intelligent, and secure computer system and architecture in the broad area of Internet-of-Things (IoT). We are taking an interdisciplinary effort spanning cutting-edge topics including emerging non-volatile memory technology, intermittently powered system, and intelligent algorithms to address the challenges in processing/transmitting unprecedented volume of data and powering all these devices.

Location: NPB 2.248
Investigator: Xie, Mimi

Bioinformatics Research and Development Group (BRDG)

The Bioinformatics Research and Development Group (BRDG - pronounced BRiDGe) at UTSA is committed to develop state-of-the-art data-analytical algorithms and tools to make complex and massive biological data more understandable and useful. Our research combines data mining, machine learning, and graph theoretical methods and we collaborate frequently with biologists for applications on real data addressing important biomedical research problems.

Location: NPB 2.202
Investigator: Ruan, Jianhua

Center for Infrastructure Assurance and Security (CIAS)

At CIAS, Dr. Greg White and his group are conducting research in three main areas: cyber security information sharing, incident detection/response in communities, and cybersecurity workforce development. They have implemented the concept of a Honey-Community as part of this research. The CIAS also hosts cyber security training programs and cyber defense competitions for industry professionals and college/high school students. The Cybersecurity Education and Gaming Lab (CEAGL) is a part of the CIAS in its workforce development effort.

Location: NPB 3.138
Investigator: White, Gregory

Cybersecurity Education and Gaming Lab (CEAGL)

CEAGL is dedicated to the development of methods to provide cybersecurity training and education. In particular, the lab is exploring methods to utilize games and gaming technology to enhance the cybersecurity training and education experience.  CEAGL resides under the CIAS and is a major player in its workforce development effort.

Location: NPB 2.232
Investigator: White, Gregory

Data Science and Technology Laboratory (DSTL)

Our mission is to advance the research on data management and data mining.

Location: NPB 2.232
Investigator: Zhang, Weining

Institute for Cyber Security (ICS)

At the ICS, Dr. Ravi Sandhu and his team conducts basic and applied research in partnership with academia, government, and industry. ICS research leaders bring a deep knowledge of cyber security models, architectures, mechanisms and protocols, as well as cyber technol-ogies to their research. ICS has built and operates two world-class academic research laboratories dedicated to studying current and emerging cyber security issues.

Location: NPB 3.122
Investigator: Sandhu, Ravi

LArge-scale System Optimization Research Lab (LASOR)

The goal of Dr. Wei Wang's lab is to make future large-scale data-intensive systems faster and greener. Their research falls in the intersections of Cloud Computing, system software, computer architecture and software engineering. Their current investigations include redesigning data centers with novel energy-efficient hardware, improving hardware management and data man-agement in system software, and inventing new software development techniques to help users write and execute large-scale applications efficiently on Clouds.

Location: NPB 2.230
Investigator: Wang, Wei

Next Generation Networks Laboratory (NGNL)

To study next generation wireline and wireless networks.

Location: NBP 2.238
Investigator: Korkmaz, Turgay

Real-Time and Embedded Systems (RTES) Lab

We study efficient usage of computing system resources to better serve the various needs of timing constrained applications through system modeling, design of scheduling algorithms, and performance analysis and evaluations. The ultimate objective of our research is to make the right use of computing resources for the right application at the right time!

Location: NPB 2.234
Investigator: Zhu, Dakai

San Antonio Geometry Algorithms (SAGA) Lab

SAGA develops cutting edge techniques and algorithms and techniques for upcoming and long-standing problems in computational geometry.  We provide geometric solutions to problems that are motivated by important applications such as medical image segmentation, building surveillance, and cloud computing.

Location: NPB 2.240
Investigator: Gibson, Matthew

San Antonio Virtual Environments (SAVE) Lab

The SAVE lab conducts research in augmented, mixed, and virtual reality (VR) and applies this technology to real world applications such as, medical training, education, rehabilitation, and exercise. The goal is to create new human-computer interfaces, immersive games, and simulations that will have a positive impact on the world.

Location: NPB 2.110
Investigator: Quarles, John P.

Security, Privacy, Trust and Ethics in Computing Lab (SPriTELab)

At the Security, Privacy, Trust and Ethics in Computing (SPriTE) lab at UTSA, Dr. Jadliwala and his team conducts basic and applied research in all areas related to systems and network security and privacy. Our current research investigations primarily span one (or more) of the following four areas: (1) security of networking protocols and applications, (2) security and privacy of cyber and cyber-physical systems and applications, (3) privacy quantification and metrics, and (4) usable security and privacy. Besides graduate research and education, an important mission of UTSA SPriTE lab is to involve undergraduate and high-school students (esp., minority and under-represented students) in security and privacy research by means of specialized camps and research opportunities.

Location: NPB 2.204
Investigator: Jadliwala, Murtuza

Software Engineering and Formal Methods Laboratory

The laboratory focuses on developing mathematically rigorous specification and verification techniques (formal methods) to improve software dependability.

Location: NPB 2.228
Investigator: Niu, Jianwei

Software Evolution, Reliability, and Security Laboratory

The laboratory focuses on advancing techniques to support software evolution, reliability, and security.

Location: NPB 2.220
Investigator: Wang, Xiaoyin

Systems and Networks (SYN) Lab

The SYN lab conducts research on the performance analysis, security, and design of high-speed computer systems and networks. The SYN Lab focuses on analytical models of performance validated by experiments and simulations and enhancing the security of computer systems and networks by redesigning hardware support and communication protocols.

Location: NPB 2.206
Investigator: Boppana, Rajendra V.

UTSA Visualization and Modeling Laboratory (VML)

Our goal is to understand the world through data. We combine visualization, machine learning, various modeling techniques, and advanced data infrastructure to look at problems in new ways.We build tools that integrate a variety of techniques with usable interfaces to make new analysis accessible.

Location: NPB 2.108
Investigator: Robbins, Kay

Vision & Artificial Intelligence Lab (VAIL)

The Vision & AI Lab conducts research in computer vision and learning. We develop techniques for designing, implementing, and reasoning about machine and deep learning models, with applications in digital media. Our objective is to improve the security and performance of visual computing, and explore applications in the physical sciences.

Location: NPB 2.210
Investigator: Fernandez, Amanda