16–19 Mar 2026
CERN
Europe/Zurich timezone
There is a live webcast for this event.

Contribution List

32 out of 32 displayed
Export to PDF
  1. Alberto Pace (CERN)
    16/03/2026, 09:00
  2. Daniele Massaro (CERN)
    16/03/2026, 09:15

    The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.

    In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:

    • We will begin...
    Go to contribution page
  3. Albert Aillet
    16/03/2026, 10:15

    See attached PDF for full citations and bibliography.

    As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...

    Go to contribution page
  4. Albert Aillet
    16/03/2026, 11:40

    See attached PDF for full citations and bibliography.

    As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...

    Go to contribution page
  5. Daniele Massaro (CERN)
    16/03/2026, 14:00

    The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.

    In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:

    • We will begin...
    Go to contribution page
  6. Airat Galiamov (Promwad d.o.o.)
    16/03/2026, 15:00

    For faster computing it is necessary to utilize data parallelism. The tools available for programmers for parallel computing depend on hardware and CPUs architecture. The RISC-V architecture provides a vector processor style Single Instruction, Multiple Data (SIMD) instruction.
    The proposed 1 hour lecture will include:
    - Concept of parallel data processing. Classification of various...

    Go to contribution page
  7. Daniele Massaro (CERN)
    16/03/2026, 16:30

    The growing computational demands of high-precision simulations for the High-Luminosity LHC (HL-LHC) era require a careful optimization of Monte Carlo event generators.

    In these lectures, we will explore different profiling techniques and their application to MadGraph5_aMC@NLO, one of the most widely used software in high-energy physics to simulate particle collisions:

    • We will begin...
    Go to contribution page
  8. Albert Aillet
    16/03/2026, 16:30

    See attached PDF for full citations and bibliography.

    As the historic race to build AI infrastructure pushes projected hyperscaler spending near 7 trillion dollars by 2030, one of the primary justifications for such staggering capital deployment is the predictability offered by neural scaling laws. This presentation examines the scale-invariant nature of deep learning, defined as a power...

    Go to contribution page
  9. Kiran Jonathan
    17/03/2026, 09:00

    Relevance to iCSC Attendees:

    In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...

    Go to contribution page
  10. Kiran Jonathan
    17/03/2026, 10:00

    Relevance to iCSC Attendees:

    In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...

    Go to contribution page
  11. Alexander Bohmer (Vienna University of Technology (AT))
    17/03/2026, 11:30

    Lecture

    What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...

    Go to contribution page
  12. Alexander Bohmer (Vienna University of Technology (AT))
    17/03/2026, 14:00

    Lecture

    What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...

    Go to contribution page
  13. Dr Athar Khodabakhsh (Helmholtz-Zentrum Berlin)
    17/03/2026, 15:00

    The Need for Dimensionality Reduction
    High-dimensional datasets often contain redundancy, noise, and complex internal structures, making direct interpretation and processing challenging. Dimensionality reduction methods offer effective solutions providing a compressed representation by projecting data into lower-dimensions while preserving their underlying structures. A set of powerful...

    Go to contribution page
  14. Kiran Jonathan
    17/03/2026, 16:30

    Relevance to iCSC Attendees:

    In scientific computing, we often find ourselves at a crossroads when starting a new project: do you reach for a fast, compiled language and sacrifice some development time and readability for performance, or do you reach for good old easy-to-write Python, and prepare to make a few coffees while your simulation or analysis runs? Libraries like Numpy and Scipy...

    Go to contribution page
  15. Alexander Bohmer (Vienna University of Technology (AT))
    17/03/2026, 17:30

    Lecture

    What do the LHC beamline, the International Space Stations orbit, and cryogenic detector temperatures have in common? They are inherently unstable and require precise, real-time control. Modern physics experiments and technologies depend on such controllers, and as systems grow more complex, controllers must not only stabilize but also optimize for performance, robustness...

    Go to contribution page
  16. Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)
    18/03/2026, 09:00

    The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...

    Go to contribution page
  17. Lehar Laxmi Joshi
    18/03/2026, 10:00

    Overview:
    Transformer architectures are now central to scientific and industrial machine-learning workflows. Through this lecture, a self-attention head will be recast as a finite-dimensional Ising-like spin system,where token embeddings correspond to vector spins and attention weights emerge from learned spin–spin couplings and external fields. Transformers will be explained using the...

    Go to contribution page
  18. Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)
    18/03/2026, 11:30

    The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...

    Go to contribution page
  19. Jaroslaw Szumega (CERN, Mines Paris - PSL)
    18/03/2026, 14:00

    You have your data. After many trials, you built your neural net. You trained it, and you are pretty glad about the value of the chosen loss function. And yet... when it comes to final evaluation - it simply doesn't work. Now what?

    Welcome to Failure Modes and Learning Pathologies Hell! In this lecture, I will discuss the common problems that may arise when dealing with certain types of...

    Go to contribution page
  20. Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)
    18/03/2026, 15:30

    The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...

    Go to contribution page
  21. Lehar Laxmi Joshi
    18/03/2026, 15:30

    Overview:
    Transformer architectures are now central to scientific and industrial machine-learning workflows. Through this lecture, a self-attention head will be recast as a finite-dimensional Ising-like spin system,where token embeddings correspond to vector spins and attention weights emerge from learned spin–spin couplings and external fields. Transformers will be explained using the...

    Go to contribution page
  22. Mrs Aleksandra Kowalczuk (Accenture/WSB Merito Universities/University of Warsaw)
    18/03/2026, 16:30

    The class focuses on cybersecurity as a key element of scientific computing, with particular emphasis on technical integrity, trust, and reproducibility of results in large, distributed research environments such as CERN. It focuses on security principles, architecture, and concepts, showing how a security by design approach supports high quality in modern computing workflows. The principles...

    Go to contribution page
  23. Jaroslaw Szumega (CERN, Mines Paris - PSL)
    18/03/2026, 16:30

    You have your data. After many trials, you built your neural net. You trained it, and you are pretty glad about the value of the chosen loss function. And yet... when it comes to final evaluation - it simply doesn't work. Now what?

    Welcome to Failure Modes and Learning Pathologies Hell! In this lecture, I will discuss the common problems that may arise when dealing with certain types of...

    Go to contribution page
  24. Donald Chung (STFC)
    19/03/2026, 09:00

    In today’s interconnected world, authentication and authorization have become critical components of modern research infrastructure. This lecture will begin by exploring traditional methods, such as certificate-based authentication, before progressing to how initiatives like WLCG, IRIS (UK computing resource federation) and SKA SRCNet (Square Kilometre Array - SKA Regional Centres...

    Go to contribution page
  25. Gianmaria Del Monte (CERN)
    19/03/2026, 10:00

    Abstract

    I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...

    Go to contribution page
  26. Lizzie Salmon
    19/03/2026, 11:30

    Git in Practice: Techniques for Collaborative Development

    This lecture will focus on Git good practices and advanced commands to help developers work more efficiently and collaboratively in shared repositories. The session will go beyond the simple pull-commit-push workflow and explore practical techniques for maintaining clean, reliable version histories in multi-developer...

    Go to contribution page
  27. Gianmaria Del Monte (CERN)
    19/03/2026, 14:00

    Abstract

    I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...

    Go to contribution page
  28. Alberto Pace (CERN)
    19/03/2026, 15:00
  29. Gianmaria Del Monte (CERN)
    19/03/2026, 15:40

    Abstract

    I/O bottlenecks are often the hidden performance killers in HEP data analysis, yet many scientists lack a deep understanding of how storage systems actually work. This lecture demystifies the complete I/O stack (from application code to physical storage) and introduces both classical and modern techniques for optimal performance. We’ll explore fundamental concepts (buffered I/O,...

    Go to contribution page
  30. Donald Chung (STFC)
    19/03/2026, 16:40

    In today’s interconnected world, authentication and authorization have become critical components of modern research infrastructure. This lecture will begin by exploring traditional methods, such as certificate-based authentication, before progressing to how initiatives like WLCG, IRIS (UK computing resource federation) and SKA SRCNet (Square Kilometre Array - SKA Regional Centres...

    Go to contribution page
  31. Lizzie Salmon
    19/03/2026, 16:40

    Git in Practice: Techniques for Collaborative Development

    This lecture will focus on Git good practices and advanced commands to help developers work more efficiently and collaboratively in shared repositories. The session will go beyond the simple pull-commit-push workflow and explore practical techniques for maintaining clean, reliable version histories in multi-developer...

    Go to contribution page
  32. Mr Isidro Javier García Fernández (European Central Bank)

    One of the core databases in the European Central Bank is the RIAD (Register of Institutions and Affiliates Data) register, a massive repository of 16 million counterparties, covering companies, institutions, funds and much more.
    One of our main task is to make sure that every entity refers to a different counterparty and no duplicates are generated. While not every record is a duplicate,...

    Go to contribution page