CERN School of Computing 2023

Europe/Zurich
Delta Centre - University of Tartu

Delta Centre - University of Tartu

Narva mnt 18, 51009 Tartu Estonia
Alberto Pace (CERN), Kristina Gunne (CERN), Jarek Polok (CERN), Veronika Zadin (University of Tartu (EE)), Tauno Tiirats (University of Tartu), Margit Meiesaar, Andrzej Nowicki (CERN)
Description

Welcome to the 44th CERN School of Computing (CSC 2023)! The school will take place from 20 August until 2 September in the beautiful city of Tartu, Estonia.

This year’s School is organized in collaboration with University of Tartu

Academic Programme

The two-week programme consists of more than 50 hours of lectures and hands-on exercises, covering three main themes: physics computing, software engineering, and data technologies. Students who pass the final optional exam will receive a diploma from CSC, as well as ECTS credits from University of Tartu.

Other activities

However, it's not all study; the social and sport programme is also a vital part of the School. We will have ample opportunities to explore and experience some of the great cultural, historical and natural attractions of Tartu and its region.

The application for this event is closed.

 

Important dates

  • Tuesday 21 March - applications open
  • Tuesday 25 April (midnight UTC+2 / CEST) - deadline for applications
  • Friday 12 May - invitations sent to the selected participants
  • Friday 9 June- registration fee payment deadline
  • Sunday 20 August (afternoon/evening) - student arrivals at Dorpat Hotel, Tartu
  • Saturday 2 September (morning) - departure

Who can apply?

The School is aimed at postgraduate (ie. minimum of Bachelor degree or equivalent) students, engineers and scientists with a few years' experience in particle physics, in computing, or in related fields. We welcome applications from all countries and nationalities. Limited financial support may be available.

   

    

CERN School of Computing
    • 15:00
      Arrival and registration at the hotel Hotel Dorpat

      Hotel Dorpat

      Welcome to CSC 2023 and to the Dorpat hotel where you will be staying for the two weeks to come!
      Registration will be open from 14 h in the afternoon.

    • 19:00
      Dinner Hotel Dorpat

      Hotel Dorpat

    • 1
      Walk to VSPA conference center VSPA

      VSPA

      Meet Kristina at the hotel reception at 9:15 to go to the VSPA conference center together

    • 2
      Announcements VSPA conference center

      VSPA conference center

      https://vspahotel.ee/en/contact/ https://www.google.com/search?q=58.376892%2C+26.728912
    • 3
      Opening Ceremony VSPA conference center

      VSPA conference center

      https://vspahotel.ee/en/contact/ https://www.google.com/search?q=58.376892%2C+26.728912

      10.00 – 10.03: Tartu University Professor of materials technology Mrs Veronika Zadin (3 min)
      10.03 – 10.10: Rector of University of Tartu prof. Toomas Asser
      10.10 – 10.15: Minister of Education and Science Mrs Kristina Kallas
      10.15 – 10.20: Deputy Mayor of Tartu Mr Mihkel Lees
      10.20 – 10.30: CERN Director of R&D prof. Joachim Mnich
      10.30 – 10.40: CERN School of Computing director, Mr Alberto Pace

      Speaker: Alberto Pace (CERN)
    • 10:45
      Welcome coffee
    • 4
      Introduction to Physics Computing L1: Hadron Collider Physics VSPA conference center

      VSPA conference center

      Here we will focus on the physics of particle collisions, theoretical aspects of the standard model of particle physics, its predictive power as well as its shortcomings. Experimental aspects such as collider facilities and modern particle physics experiments as well as example physics questions and corresponding data analyses will be discussed. Furthermore, the compute models with the resulting amount of recorded data and simulated Monte Carlo events will be described.

      Speaker: Arnulf Quadt (Georg August Universitaet Goettingen (DE))
    • 5
      Tools and Techniques L1: Introduction VSPA conference center

      VSPA conference center

      First, we discuss some of the characteristics of software projects for high energy physics, and some of the issues that arise when people want to contribute to them. We then continue with a brief introduction to software engineering from the perspective of the individual contributor, both as a formal process and how it actually affects what you do. We discuss the examples of unit testing and memory access problems.

      Speaker: Pere Mato Vila (CERN)
    • 6
      Walk to DELTA building
    • 13:30
      Lunch
    • 7
      Tools and Techniques L2: Tools for Collaboration, Software Engineering Across the Project

      We continue the track with a discussion of system performance, and what you can (and can't) to affect it. We examine tools to help with that, discussing how they work and how they can mislead. We then discuss source control as a tool for collaboration. Using examples from basic to large and advanced, we show how individual choices can affect the building of large systems.

      Speaker: Pere Mato Vila (CERN)
    • 8
      Exercise 1: Tools and Techniques

      The exercises provide some direct experience with the tools and techniques described in the Lectures. Teams of two students will work together on examples designed to show the strengths and weaknesses of various tools and approaches. Basic and advanced exercises are available so that students can work at their own level.

      The very first step is find somebody to work with and sit down together. The two of you will be working together on these exercises. These have been designed to work best two people (or occasionally three), not with one!
      To start the exercises, open the instructions URL (below) in your favorite web browser and follow those instructions.
      Please read that index page’s instructions all the way through. We’ve put some general info at the top that you should know, and put some reference links at the bottom that you might later discover you need.

      Speaker: Pere Mato Vila (CERN)
    • 16:30
      Coffee break
    • 9
      ㅤExercise 2: Tools and Techniques

      This is a continuation of the Tools and Techniques exercises

      Speaker: Pere Mato Vila (CERN)
    • 10
      Self-presentation: 1 minute per person
    • 20:00
      Welcome dinner at Ülikooli Kohvik / DRINKGELD Ülikooli Kohvik / DRINKGELD

      Ülikooli Kohvik / DRINKGELD

      Ülikooli 20, 51007 Tartu
    • 11
      Introduction to Physics Computing L2: Digital Data, Simulation and Reconstruction in Modern Particle Physics Experiments

      Here, a focus will be placed on specific detector sub-components and their data readout concepts as well as data reconstruction techniques, simulation techniques and analysis techniques.

      Speaker: Arnulf Quadt (Georg August Universitaet Goettingen (DE))
    • 12
      Data Science L1: Tools for interactive data exploration

      High energy physics has a rich history of interactive exploration of physics data, starting with tools like PAW and ROOT. The explosion of Data Science has created new tools for interactive exploration of large and ad-hoc datasets. This lecture introduces some of these, and shows how they can be used to find new and useful features starting with available data.

      Speaker: Pere Mato Vila (CERN)
    • 13
    • 11:00
      Coffee break
    • 14
      Data Science L2: Interactive exploration of non-numeric data

      This lecture continues the exploration of interactive tools, using a learn-by-doing approach. It covers approaches for statistical simulation, geographical analysis, and textual data.

      Speaker: Pere Mato Vila (CERN)
    • 15
      Exercise 3: Tools and Techniques

      The exercises provide some direct experience with the tools and techniques described in the Lectures. Teams of two students will work together on examples designed to show the strengths and weaknesses of various tools and approaches. Basic and advanced exercises are available so that students can work at their own level.

      Speaker: Pere Mato Vila (CERN)
    • 13:30
      Lunch
    • 16
      Study or sports time
    • 16:00
      Coffee break
    • 17
      Exercises 1: Data Science

      The exercises provide hands-on experience in three phases: First, we reiterate some examples from lecture to give basic experience. A set of intermediate exercises then extends that to some new problem areas. Finally, students can choose of one of several larger advanced problems to work through.

      The very first step is find somebody to work with and sit down together. The two of you will be working together on these exercises. These have been designed to work best wo people (or occasionally three), not with one!
      To start the exercises, open the instructions URL (below) in your favorite web browser and follow those instructions.
      Please read that index page’s instructions all the way through. We’ve put some general info at the top that you should know, and put some reference links at the bottom that you
      might later discover you need.

      Speaker: Pere Mato Vila (CERN)
    • 18
      Exercises 2: Data Science

      The exercises provide hands-on experience in three phases: First, we reiterate some examples from lecture to give basic experience. A set of intermediate exercises then extends that to some new problem areas. Finally, students can choose of one of several larger advanced problems to work through.

      Speaker: Pere Mato Vila (CERN)
    • 19:30
      Special dinner and pub quiz at Gunpowder Cellar of Tartu Gunpowder Cellar of Tartu

      Gunpowder Cellar of Tartu

      Lossi 28, 51003 Tartu
    • 19
      Software Design L1: Parallelism in a Modern HEP Data Processing Framework

      Even though the miniaturization of transistors on chips continues like predicted by Moore's law, computer hardware starts to face scaling issues, so-called performance 'walls'. Probably, the best known is the 'power wall', which limits clock frequencies. Amongst others, a way of increasing processor performance remains now to integrate many cores in the same chip. At the same time, the upcoming LHC upgrade will increase the required CPU power drastically. Both problems challenge the current way of software design in high energy physics (HEP). Developers in high energy physics are forced to re-think their ways of software design and need to move to massively parallel applications. This lecture will explain the current HEP software design, the hardware and physics issues that need to be tackled, and possible approaches to achieve the required level of parallelization.

      Speaker: Stephan Hageboeck (CERN)
    • 20
      Software Design L2: Base Concepts of Parallel Programming: A Pragmatic Approach

      This and the following lecture will explain the concepts behind various parallelization methodologies.
      First, a theoretical introduction to threads, thread-safety and concurrent data access will be given. As the recent C++ standards (starting from C++11) provide build-in support for parallel programming, their most commonly used concurrency features will be shown. Finally, concrete solutions for problems specific to concurrent programming will be discussed.

      Speaker: Andrei Gheata (CERN)
    • 21
    • 11:00
      Coffee break
    • 22
      Data Management L1: Setting the scene: Storage technologies, Storage reliability

      The lecture presents the various Storage Models, and the supporting management techniques.

      The lecture will then go in details on techniques to deliver arbitrary reliability and performance and discuss the solutions for long data preservation and trading between reliability, performances and costs.

      Speaker: Alberto Pace (CERN)
    • 23
      Software Design L3: Understanding, Debugging and Profiling a Complex Multithreaded Application

      Dealing with a parallel application is complex. We need to use procedures to rise fences to protect against mistakes, like static analysis tools allowing to find bugs in an automatic way. We also need to use tools to inspect and manipulate the behavior of programs at runtime, like the GDB debugger. Finally, profilers such as igprof can help us understand the performance bottlenecks of an application and get more insight on its efficiency. The objective of this lecture is to become familiar with these tools and be able to apply them in multithreaded programs.

      Speaker: Andrei Gheata (CERN)
    • 13:30
      Lunch
    • 24
      Study or sports time
    • 16:00
      Coffee break
    • 25
      Exercises 1: Software Design

      The exercises will cover the topics of lectures 1 to 4 at a hands-on basis, based on C++11, TBB and Spark. It covers examples for the new C++11 functionality related to threads and thread safety. In addition, there will be examples for concurrent access to data, lock and lock-free data structures, and task based programming.  Finally, there will be an exercise to practise the Map-Reduce pattern by using the Spark parallel data processing framework.

      Speakers: Andrei Gheata (CERN), Stephan Hageboeck (CERN)
    • 26
      Exercises 2: Software Design

      The exercises will cover the topics of lectures 1 to 4 at a hands-on basis, based on C++11, TBB and Spark. It covers examples for the new C++11 functionality related to threads and thread safety. In addition, there will be examples for concurrent access to data, lock and lock-free data structures, and task based programming.  Finally, there will be an exercise to practise the Map-Reduce pattern by using the Spark parallel data processing framework.

      Speakers: Andrei Gheata (CERN), Stephan Hageboeck (CERN)
    • 19:00
      Dinner Dorpat Hotel

      Dorpat Hotel

    • 27
      The history of Estonia and current situation
      Speaker: Arnulf Quadt (Georg August Universitaet Goettingen (DE))
    • 28
      Data Management L2: Cryptography, authentication, authorization and accounting 1

      This lectures give elements of computer security that are relevant to data management. The lectures address the various cryptographic technologies used in data storage systems to ensure data encryption, integrity, confidentiality and access control. The Public Key infrastructure standard will be described as an example.

      Speaker: Alberto Pace (CERN)
    • 29
      Software Design L4: Patterns for Parallel Software Development

      This lecture will present a set of common patterns in parallel programming. The sequential origin of these patterns will be discussed, as well as the restrictions that they impose. A particularly successful combination of patterns, Map-Reduce, will be described in detail and examples of its everyday use at large scale will be given. On the other hand, it will be shown how high-level features like C++ lambdas, the TBB library or the Spark framework can help get started with the aforementioned parallel patterns.

      Speaker: Stephan Hageboeck (CERN)
    • 30
    • 11:00
      Coffee break
    • 31
      Data Management L3: Cryptography, authentication, authorization and accounting 2

      This lecture will continue the discussion on various authentication technologies and then move to authorization. Accounting will also be addressed.

      Speaker: Alberto Pace (CERN)
    • 32
      Data Management L4: Distributed Hash Tables, Data Replication, Caching, Monitoring, Alarms and Quota 1

      This lecture describes the various possible technologies used to implement distributed hash tables, data workflows and complex data transfer processes. It also discusses problems with data caching and Garbage Collection to conclude on monitoring and quota enforcement.

      Speaker: Alberto Pace (CERN)
    • 33
      School photo
    • 13:30
      Lunch
    • 14:30
      Study, Sports or Visit of the City of Tartu with guide

      Afternoon with free time

    • 16:30
      Departure from Delta for City tour guide 1 and 2
    • 18:00
      Departure from Tartu town square for City tour guide 3

      Departure from the space in front of the Town hall.

    • 19:30
      Dinner Dorpat hotel

      Dorpat hotel

    • 34
      Data Management L5: Distributed Hash Tables, Data Replication, Caching, Monitoring, Alarms and Quota 2

      This lecture concludes the description of the various possible technologies used to implement distributed hash tables, data workflows and complex data transfer processes. It also discusses problems with data caching and Garbage Collection to conclude on monitoring and quota enforcement.

      Speaker: Alberto Pace (CERN)
    • 35
      Data Visualization L1: The Theory Behind Data Visualization

      In this lecture, we introduce the basic concepts behind data visualization, what we are visualizing, why we are visualizing it, and how we can visualize data more effectively.

      Speaker: Eamonn Maguire
    • 36
    • 11:00
      Coffee break
    • 37
      Data Visualization L2: Practical Applications of Theory and Multi-Dimensional Data Visualization

      In this lecture we apply some of what we learned in Lecture 1 and also introduce the visualization of multi-dimensional data.

      Speaker: Eamonn Maguire
    • 38
      ㅤExercise 3: Software Design

      This is a continuation of the Software Design exercises.

      Speakers: Andrei Gheata (CERN), Stephan Hageboeck (CERN)
    • 13:30
      Lunch
    • 39
      Study or sports time
    • 16:00
      Coffee break
    • 40
      Exercise 1: Data Visualization
      Speaker: Eamonn Maguire
    • 41
      Exercise 2: Data Visualization
      Speaker: Eamonn Maguire
    • 19:30
      Dinner Dorpat Hotel

      Dorpat Hotel

    • 42
      Data Technologies: Introduction

      The lecture will introduce the basic concepts of IO systems, protocols and data storage models as a preparation to the data technology exercises.

      Speakers: Alberto Pace (CERN), Andreas Joachim Peters (CERN)
    • 43
      Student Lightning Talks
    • 44
    • 11:00
      Coffee break
    • 45
      Data Technologies - exercises

      The first part of hands-on exercises aims to improve understanding of basic parameters in IO systems:
      • network and media latency
      • access patterns
      • OS caching
      • bottlenecks and optimization strategies for local and remote data access.
      Few essential Linux tools will be introduced to monitor and measure IO performance avoiding bias introduced by OS caching. Students will experience and measure the impact of latency and access patterns on IO performance.
      The second part covers the concept of parallelism and redundancy in storage system. We will apply the technology of Cloud storage systems to store and retrieve files in our local desktop cluster using a distributed hash table to locate files or file fragments and a REST interface to do GET, PUT or DELETE operations on these.
      The exercises conclude with the implementation and performance tuning of a RAID verification algorithm.

      Speakers: Alberto Pace (CERN), Andreas Joachim Peters (CERN)
    • 46
      Data Technologies - exercises

      The first part of hands-on exercises aims to improve understanding of basic parameters in IO systems:
      • network and media latency
      • access patterns
      • OS caching
      • bottlenecks and optimization strategies for local and remote data access.
      Few essential Linux tools will be introduced to monitor and measure IO performance avoiding bias introduced by OS caching. Students will experience and measure the impact of latency and access patterns on IO performance.
      The second part covers the concept of parallelism and redundancy in storage system. We will apply the technology of Cloud storage systems to store and retrieve files in our local desktop cluster using a distributed hash table to locate files or file fragments and a REST interface to do GET, PUT or DELETE operations on these.
      The exercises conclude with the implementation and performance tuning of a RAID verification algorithm.

      Speaker: Andreas Joachim Peters (CERN)
    • 13:30
      (Packed) Lunch to go
    • 47
      Visit to the Estonia National Museum (optional) Estonian National Museum

      Estonian National Museum

      https://www.erm.ee/en/museum

      Do not miss the Estonian National Museum! https://erm.ee/en
      The Estonian National Museum was founded in Tartu in 1909 on the initiative and with the support of the nation – with the task to protect and develop the history and culture of Estonia. As in many other European countries, primary importance was attached to preserving the old, fading peasant culture. Also considered essential was gathering and looking after artefacts contributing to better understanding of cultural development, archaeological findings, old coins, books, manuscripts and historical records.

      Over time, a number of other museums, archives and libraries were founded, and the Estonian National Museum re-focused mainly on folk culture. Until World War II, the Estonian National Museum accumulated everything related to the Estonian national heritage. The fact that the museum had become a recognised memory institution by the 1930s was greatly supported also by contacts with foreign countries (Finland, Sweden, Germany, France etc), both in exchanging scientific literature, participating in study and research trips and scientific conferences and also through organising exhibitions outside Estonia.

      Today, Estonian National Museum preserves the feeling of continuity and tradition. The museum is the generator and developer of cultural dialogue which links the past and the future. ENMs role as a centre of ethnological research is to record, study and interpret culture as a way of life, taking into account its periodical, spatial and social diversity. The Museum's function as a contemporary cultural and tourist centre is to show our cultures uniqueness and primeval power of creation to every Estonian and visitor.

      The main emphasis of research and collecting is on Estonian everyday life in the second half of the 20th century as well as on the Estonian diaspora and audiovisual, archival and artifactual data from Finno-Ugric cultures. Through the Museum’s exhibitions and events, one can take a look at Estonians’ everyday lives in different periods. Interactive displays offer hands-on experience; it is possible to observe what an Estonian home looks like, explore Estonian cuisine and make oneself familiar with local dress, language and customs. Attention is also paid to the cultures of other nations, especially those of the Finno-Ugric peoples.

    • 19:30
      Dinner Dorpat Hotel

      Dorpat Hotel

    • 48
      Meeting in front of the hotel, entering buses
    • 09:00
      Excursion - Canoeing and Sauna culture

      Full day excursion including lunch and dinner

    • 49
      Data Analysis L1: Introduction

      In this lecture we will explain what are the main goals of data analysis. We will introduce statistics as the powerful mathematical tool for data analysis. We will define probability and random variables as key concepts in statistics for data analysis.

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 50
      Data Analysis L2: Probability density functions and Monte Carlo methods

      In this lecture we will discuss what probability density functions (PDFs) are, and what are their main properties. We will mention the most important PDFs and their properties both for discrete and continuous random variables. The importance of the Gaussian distribution lies in the Central Limit Theorem that will be discussed. Finally, we will discuss the concept of Monte Carlo methods and their usage in High Energy Physics and Data Analysis.

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 51
    • 11:00
      Coffee break
    • 52
      Data Analysis L3: Parameter estimation and confidence intervals

      In this lecture we will introduce the concept of test statistics and estimators. We will explain what are the key properties of a good estimator and how to obtain it using the Maximum Likelihood and Least Squares methods. We will define confidence intervals and make a strong statement on their statistical interpretation when discussing scientific results. Finally, we will learn how to derive confidence intervals for the Maximum likelihood and Least Squares methods.

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 53
      Estonia E-Data
      Speaker: Dr Kristo Vaher (Ministry of Economic Affairs and Communications)
    • 13:30
      Lunch
    • 54
      Study or sports time
    • 16:00
      Coffee break
    • 55
      Exercises 2: Data Technologies

      This is a continuation of the Data Technologies exercises.

      Speaker: Andreas Joachim Peters (CERN)
    • 56
      Exercises 3: Data Technologies

      This is a continuation of the Data Technologies exercises.

      Speaker: Andreas Joachim Peters (CERN)
    • 19:00
      Dinner at the Delta cafeteria DELTA

      DELTA

    • 57
      Special evening talk: When Internet history meets philosophy 1037 (Delta centre)

      1037

      Delta centre

      Speaker: Francois Fluckiger
    • 58
      Machine Learning L1
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 59
      Software Security L1: Introduction

      The first lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. The lecture highlights the importance of proper threat modelling and risk assessment. It then presents three complementary methods of mitigating threats: protection, detection, reaction; and tries to prove that security through obscurity is not a good choice.

      Speaker: Sebastian Lopienski (CERN)
    • 60
    • 11:00
      Coffee break
    • 61
      Machine Learning L2
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 62
      Software Security L2: Security in different phases of software development

      The second lecture addresses the following question: how to create secure software? It introduces the main security principles (like least privilege, or defense in depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development.

      Speaker: Sebastian Lopienski (CERN)
    • 13:30
      Lunch
    • 63
      Study or sports time
    • 16:00
      Coffee break
    • 64
      Exercises 1: Software Security

      In the practice session, a range of typical security vulnerabilities will be presented. The goal is to learn how they can be exploited (for privilege escalation, data confidentiality compromise etc.), how to correct them, and how to avoid them in the first place! Students will be given small pieces of source code in different programming languages, and will be asked to find vulnerabilities and fix them. The online course documentation will gradually reveal more and more information to help students in this task. Additionally, students will have a chance to try several source code analysis tools, and see how such tools can help them find functionality bugs and security vulnerabilities.

      Speaker: Sebastian Lopienski (CERN)
    • 65
      Exercises 2: Software Security

      In the practice session, a range of typical security vulnerabilities will be presented. The goal is to learn how they can be exploited (for privilege escalation, data confidentiality compromise etc.), how to correct them, and how to avoid them in the first place! Students will be given small pieces of source code in different programming languages, and will be asked to find vulnerabilities and fix them. The online course documentation will gradually reveal more and more information to help students in this task. Additionally, students will have a chance to try several source code analysis tools, and see how such tools can help them find functionality bugs and security vulnerabilities.

      Speaker: Sebastian Lopienski (CERN)
    • 19:30
      Pizza Dinner at Vapiano Vapiano Tartu

      Vapiano Tartu

      Riia 2, 51004 Tartu
    • 66
      Machine Learning L3
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 67
      Data Analysis L4: Hypothesis testing and p-value

      We will learn about the hypothesis testing procedure and all of its key concepts. We will discuss how to choose a critical region and learn about errors of first and second kind. We will learn the importance of a blinded analysis and understand all the needed steps before looking at the data. Finally, we will discuss when can we announce a discovery in science and the concept of a p-value.

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 68
    • 11:00
      Coffee break
    • 69
      Exercises 1: Data Analysis

      There will be 3 sets of exercises covering basic properties of PDFs and Monte Carlo generators, Maximum Likelihood fit, and Hypothesis testing. Students will be given realistic but simplified problems where key concepts from statistics need to be applied in order to provide scientific interpretation of data. Each set of exercises consists of 5 problems that will help guide the student. Data is provided in a simple text file and can be analysed with any programming language that offers libraries for statistical analysis (Python or C++ are recommended).

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 70
      Exercises 2: Data Analysis

      There will be 3 sets of exercises covering basic properties of PDFs and Monte Carlo generators, Maximum Likelihood fit, and Hypothesis testing. Students will be given realistic but simplified problems where key concepts from statistics need to be applied in order to provide scientific interpretation of data. Each set of exercises consists of 5 problems that will help guide the student. Data is provided in a simple text file and can be analysed with any programming language that offers libraries for statistical analysis (Python or C++ are recommended).

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 13:30
      Lunch
    • 71
      Study or sports time
    • 16:00
      Coffee break
    • 72
      Exercise 3: Software Security

      In the practice session, a range of typical security vulnerabilities will be presented. The goal is to learn how they can be exploited (for privilege escalation, data confidentiality compromise etc.), how to correct them, and how to avoid them in the first place! Students will be given small pieces of source code in different programming languages, and will be asked to find vulnerabilities and fix them. The online course documentation will gradually reveal more and more information to help students in this task. Additionally, students will have a chance to try several source code analysis tools, and see how such tools can help them find functionality bugs and security vulnerabilities.

      Speaker: Sebastian Lopienski (CERN)
    • 73
      ㅤExercise 1: Machine Learning
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 19:30
      Dinner Dorpat Hotel

      Dorpat Hotel

    • 74
      Software Security L3: Web application security, exercise debriefing

      This third hour consists of a debriefing of the exercises, and in particular those web-related. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed.

      Speaker: Sebastian Lopienski (CERN)
    • 75
    • 76
      ㅤExercise 3: Data Analysis

      This is a continuation of the Data Analysis exercises

      Speaker: Toni Sculac (University of Split Faculty of Science (HR))
    • 11:00
      Coffee break
    • 77
      Exercises 2: Machine Learning
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 78
      Exercises 3: Machine Learning
      Speaker: Lukas Alexander Heinrich (Technische Universitat Munchen (DE))
    • 13:30
      Lunch
    • 79
      Exam

      In order to see results please login with you CERN account (the one used during exercises)

    • 16:00
      Coffee break
    • 80
      The CSC Traditional football match
    • 19:30
      Dinner Dorpat Hotel

      Dorpat Hotel

    • 81
      Student Lightning talks
    • 82
    • 10:45
      Coffee break
    • 83
      Transport to visits
    • 84
      Visits to GSCAN/Tartu Observatory

      Field trip to GScan
      GScan is a company near Tartu that is redefining the boundaries of 3D scanning with Muon Flux Technology (MFT) detectors.
      GScan is using naturally occurring cosmic-ray induced muons, electrons and positrons as the source for performing 3D scanning and chemical composition analysis. Utilising a natural source makes every GScan system radiation safe - no harm to the surrounding people nor the environment itself. Their solutions are modular and highly-scalable, using the in-house developed 1m x 2m detector array modules. With a strong base of startup mindset, fundamental and information sciences, a highly modern manufacturing industry, coupled with high work ethics coming from Estonia has provided us with a strong competitive edge for developing such a complex technology.

      Field trip to Tartu Observatory
      Tartu Observatory is an Estonian space centre whose main task is research and development. They train young scientists in astronomy, remote sensing, and space technology, and are a recognised partner in international networks. Tartu Observatory has accredited test laboratories where companies can test their equipment in different environmental conditions. The laboratory complex of the observatory offers environmental testing of devices and optical measurements. The laboratories include special electrostatic discharge (ESD) safe areas, a cleanroom and an anechoic environment.
      Tartu Observatory´s history goes back to the 19th century when the Tartu Old Observatory (Tartu Tähetorn) was built. There, astronomer F. G. W. Struve created the meridian arc to determine the shape and size of the globe, this geodetic arc is listed under UNESCO World Heritage. In the mid 20th century scientists led by Einasto discovered the honeycomb-like structure of the universe.
      We`ll visit the laboratories, have mini lecture about data gathering and science in soviet times and of course visit the big telescope (1.5 m mirror telescope AZT-12 with a long-slit spectograph in the Cassegrain focus, providing spectral resolution of R~ 100 to 12000).

    • 85
      Transport to Delta building
    • 13:30
      Lunch
    • 86
    • 19:30
      Closing dinner at Vilde Ja Vine Vilde Ja Vine

      Vilde Ja Vine

      Vallikraavi 4, 51003 Tartu
    • 09:00
      Departure