Follow
Jens Mache
Title
Cited by
Cited by
Year
A comparative study of real workload traces and synthetic workload models for parallel job scheduling
V Lo, J Mache, K Windisch
Workshop on job scheduling strategies for parallel processing, 25-46, 1998
1401998
Hands-on denial of service lab exercises using slowloris and rudy
E Damon, J Dale, E Laron, J Mache, N Land, R Weiss
proceedings of the 2012 information security curriculum development …, 2012
602012
Minimizing message-passing contention in fragmentation-free processor allocation
J Mache, V Lo, K Windisch
Proc. 10th Intern. Conf. Parallel and Distributed Computing Systems, 120-124, 1997
531997
Lightweight key distribution and management method for sensor networks
CY Wan, M Yarvis, J Mache
US Patent App. 11/751,643, 2008
50*2008
Teaching cybersecurity analysis skills in the cloud
RS Weiss, S Boesen, JF Sullivan, ME Locasto, J Mache, E Nilsen
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
442015
Cluster computing in the classroom: Topics, guidelines, and experiences
A Apon, R Buyya, H Jin, J Mache
Proceedings First IEEE/ACM International Symposium on Cluster Computing and …, 2001
442001
Cybersecurity education and assessment in EDURange
R Weiss, F Turbak, J Mache, ME Locasto
IEEE Security & Privacy 15 (03), 90-95, 2017
372017
A reflective approach to assessing student performance in cybersecurity exercises
R Weiss, ME Locasto, J Mache
Proceedings of the 47th ACM technical symposium on computing science …, 2016
332016
Communication patterns and allocation strategies
DP Bunde, VJ Leung, J Mache
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
322004
Job scheduling for prime time vs. non-prime time
V Lo, J Mache
Proceedings. IEEE International Conference on Cluster Computing, 488-493, 2002
312002
Dispersal metrics for non-contiguous processor allocation
J Mache, V Lo
Technical Report CIS-TR-96-13, University of Oregon, 1996
291996
The E ects of Dispersal on Message-Passing Contention in Processor Allocation Strategies
J Mache, V Lo
271997
{EDURange}: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments
S Boesen, R Weiss, J Sullivan, ME Locasto, J Mache, E Nilsen
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
252014
Cluster computing in the classroom and integration with computing curricula 2001
A Apon, J Mache, R Buyya, H Jin
ieee Transactions on Education 47 (2), 188-195, 2004
242004
An assessment of Gigabit Ethernet as cluster interconnect
J Mache
ICWC 99. IEEE Computer Society International Workshop on Cluster Computing …, 1999
231999
Top 10 hands-on cybersecurity exercises
R Weiss, J Mache, E Nilsen
Journal of Computing Sciences in Colleges 29 (1), 140-147, 2013
212013
Practical error correction for resource-constrained wireless networks: Unlocking the full power of the CRC
T Mandel, J Mache
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013
172013
Request algorithms in Freenet-style peer-to-peer systems
J Mache, M Gilbert, J Guchereau, J Lesh, F Ramli, M Wilkinson
Proceedings. Second International Conference on Peer-to-Peer Computing,, 90-95, 2002
162002
Finding the balance between guidance and independence in cybersecurity exercises
R Weiss, F Turbak, J Mache, E Nilsen, ME Locasto
2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
152016
Teaching grid computing: topics, exercises, and experiences
J Mache, A Apon
IEEE Transactions on Education 50 (1), 3-9, 2007
152007
The system can't perform the operation now. Try again later.
Articles 1–20