-
Alberto Pace (CERN)16/03/2026, 09:00
-
Daniele Massaro (CERN)16/03/2026, 09:15
The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.
In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:
- We will begin...
-
Albert Aillet16/03/2026, 10:15
See attached PDF for full citations and bibliography.
As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...
Go to contribution page -
Albert Aillet16/03/2026, 11:40
See attached PDF for full citations and bibliography.
As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...
Go to contribution page -
Daniele Massaro (CERN)16/03/2026, 14:00
The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.
In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:
- We will begin...
-
Airat Galiamov (Promwad d.o.o.)16/03/2026, 15:00
For faster computing it is necessary to utilize data parallelism. The tools available for programmers for parallel computing depend on hardware and CPUs architecture. The RISC-V architecture provides a vector processor style Single Instruction, Multiple Data (SIMD) instruction.
Go to contribution page
The proposed 1 hour lecture will include:
- Concept of parallel data processing. Classification of various... -
Daniele Massaro (CERN)16/03/2026, 16:30
The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.
In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:
- We will begin...
-
Albert Aillet16/03/2026, 16:30
See attached PDF for full citations and bibliography.
As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...
Go to contribution page -
Kiran Jonathan17/03/2026, 09:00
Relevance to iCSC Attendees:
In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...
Go to contribution page -
Kiran Jonathan17/03/2026, 10:00
Relevance to iCSC Attendees:
In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...
Go to contribution page -
Alexander Bohmer (Vienna University of Technology (AT))17/03/2026, 11:30
Lecture
What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...
Go to contribution page -
Alexander Bohmer (Vienna University of Technology (AT))17/03/2026, 14:00
Lecture
What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...
Go to contribution page -
Dr Athar Khodabakhsh (Helmholtz-Zentrum Berlin)17/03/2026, 15:00
The Need for Dimensionality Reduction
Go to contribution page
High-dimensional datasets often contain redundancy, noise, and complex internal structures, making direct interpretation and processing challenging. Dimensionality reduction methods offer effective solutions providing a compressed representation by projecting data into lower-dimensions while preserving their underlying structures. A set of powerful... -
Kiran Jonathan17/03/2026, 16:30
Relevance to iCSC Attendees:
In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...
Go to contribution page -
Alexander Bohmer (Vienna University of Technology (AT))17/03/2026, 17:30
Lecture
What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...
Go to contribution page -
Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)18/03/2026, 09:00
The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...
Go to contribution page -
Lehar Laxmi Joshi18/03/2026, 10:00
Overview:
Go to contribution page
Transformer architectures are now central to scientific and industrial machine-learning workflows. Through this lecture, a self-attention head will be recast as a finite-dimensional Ising-like spin system,where token embeddings correspond to vector spins and attention weights emerge from learned spin–spin couplings and external fields. Transformers will be explained using the... -
Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)18/03/2026, 11:30
The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...
Go to contribution page -
Jaroslaw Szumega (CERN, Mines Paris - PSL)18/03/2026, 14:00
You have your data. After many trials, you built your neural net. You trained it, and you are pretty glad about the value of the chosen loss function. And yet... when it comes to final evaluation - it simply doesn't work. Now what?
Welcome to Failure Modes and Learning Pathologies Hell! In this lecture, I will discuss the common problems that may arise when dealing with certain types of...
Go to contribution page -
Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)18/03/2026, 15:30
The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...
Go to contribution page -
Lehar Laxmi Joshi18/03/2026, 15:30
Overview:
Go to contribution page
Transformer architectures are now central to scientific and industrial machine-learning workflows. Through this lecture, a self-attention head will be recast as a finite-dimensional Ising-like spin system,where token embeddings correspond to vector spins and attention weights emerge from learned spin–spin couplings and external fields. Transformers will be explained using the... -
Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)18/03/2026, 16:30
The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...
Go to contribution page -
Jaroslaw Szumega (CERN, Mines Paris - PSL)18/03/2026, 16:30
You have your data. After many trials, you built your neural net. You trained it, and you are pretty glad about the value of the chosen loss function. And yet... when it comes to final evaluation - it simply doesn't work. Now what?
Welcome to Failure Modes and Learning Pathologies Hell! In this lecture, I will discuss the common problems that may arise when dealing with certain types of...
Go to contribution page -
Donald Chung (STFC)19/03/2026, 09:00
In today’s interconnected world, authentication and authorization have become critical components of modern research infrastructure. This lecture will begin by exploring traditional methods, such as certificate-based authentication, before progressing to how initiatives like WLCG, IRIS (UK computing resource federation) and SKA SRCNet (Square Kilometre Array - SKA Regional Centres...
Go to contribution page -
Gianmaria Del Monte (CERN)19/03/2026, 10:00
Abstract
I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...
Go to contribution page -
Lizzie Salmon19/03/2026, 11:30
Git in Practice: Techniques for Collaborative Development
This lecture will focus on Git good practices and advanced commands to help developers work more efficiently and collaboratively in shared repositories. The session will go beyond the simple pull-commit-push workflow and explore practical techniques for maintaining clean, reliable version histories in multi-developer...
Go to contribution page -
Gianmaria Del Monte (CERN)19/03/2026, 14:00
Abstract
I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...
Go to contribution page -
Alberto Pace (CERN)19/03/2026, 15:00
-
Gianmaria Del Monte (CERN)19/03/2026, 15:40
Abstract
I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...
Go to contribution page -
Donald Chung (STFC)19/03/2026, 16:40
In today’s interconnected world, authentication and authorization have become critical components of modern research infrastructure. This lecture will begin by exploring traditional methods, such as certificate-based authentication, before progressing to how initiatives like WLCG, IRIS (UK computing resource federation) and SKA SRCNet (Square Kilometre Array - SKA Regional Centres...
Go to contribution page -
Lizzie Salmon19/03/2026, 16:40
Git in Practice: Techniques for Collaborative Development
This lecture will focus on Git good practices and advanced commands to help developers work more efficiently and collaboratively in shared repositories. The session will go beyond the simple pull-commit-push workflow and explore practical techniques for maintaining clean, reliable version histories in multi-developer...
Go to contribution page -
Mr Isidro Javier García Fernández (European Central Bank)
One of the core databases in the European Central Bank is the RIAD (Register of Institutions and Affiliates Data) register, a massive repository of 16 million counterparties, covering companies, institutions, funds and much more.
Go to contribution page
One of our main task is to make sure that every entity refers to a different counterparty and no duplicates are generated. While not every record is a duplicate,...
Choose timezone
Your profile timezone: