Today we share a very unique user experience -- a conversation with Rafael Tolosana Calasanz who is an Associate Professor in the Department of Informatics of the University of Zaragoza, Spain and has participated in the reproducibility initiative at SC. Rafael shares with us his experiences reproducing artifacts on Chameleon and his insights on reproducibility and its importance to the modern scientific process.
This month's user experiment blog covers some interesting work on tensor analysis from researchers at Arizona State University.
This month, we talk to Rick Anderson from Rutgers University about his experience using Chameleon to experiment with autonomous vehicles!
In this month's user experiment blog we get a fascinating insight into how much power training deep neural networks (DNNs) consumes – and how to make it less. The authors’ discuss research presented as part of their NSDI ’23 paper, describe how they structured their experiments on Chameleon, and explain why bare metal resources are essential for power management research.
Learn how Radar Operations Center (ROC) used Chameleon resources as a standing backup for a planned outage.
Learn how to use EdgeVPN.io to easily create Virtual Private Networks (VPNs) and run unmodified middleware and applications across edge and cloud computing resources across networks with different firewalls and NATs (Network Address Translators).
Researchers from Arizona State University developed DataStorm -- an easy-to-use platform for large scale ensemble simulations, which enables researchers to collaborate and achieve deep actionable insights.
How do you develop and evaluate a new analytic on a network connection data set across large, enterprise systems without malware used to train machine learning models for cyber attacks? Researchers at the University of Virginia approach the problem by simulating self-propagating malware.
Graph Pattern Mining (GPMI) applications are considered a new class of data-intensive applications -- they generate massive irregular computation workloads and pose memory access challenges, which degrade the performance and scalability significantly. Researchers at the Illinois Institute of Technology approach the problem by using the emerging process-in-memory architecture.
Interested in protecting remote devices from malicious actors? Learn about how a researcher at the University of Missouri is approaching this problem with genetic algorithms and host fingerprinting! Also included is a YouTube video where Dr. Aksoy discusses this research.