Seguir
Jens Mache
Título
Citado por
Citado por
Año
A comparative study of real workload traces and synthetic workload models for parallel job scheduling
V Lo, J Mache, K Windisch
Job Scheduling Strategies for Parallel Processing: IPPS/SPDP'98 Workshop …, 1998
1391998
Hands-on denial of service lab exercises using slowloris and rudy
E Damon, J Dale, E Laron, J Mache, N Land, R Weiss
proceedings of the 2012 information security curriculum development …, 2012
632012
Minimizing message-passing contention in fragmentation-free processor allocation
J Mache, V Lo, K Windisch
Proceedings of the 10th International Conference on Parallel and Distributed …, 1997
551997
Lightweight key distribution and management method for sensor networks
CY Wan, M Yarvis, J Mache
US Patent App. 11/751,643, 2008
53*2008
Teaching cybersecurity analysis skills in the cloud
RS Weiss, S Boesen, JF Sullivan, ME Locasto, J Mache, E Nilsen
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
482015
Cybersecurity education and assessment in EDURange
R Weiss, F Turbak, J Mache, ME Locasto
IEEE Security & Privacy 15 (03), 90-95, 2017
442017
Cluster computing in the classroom: Topics, guidelines, and experiences
A Apon, R Buyya, H Jin, J Mache
Proceedings First IEEE/ACM International Symposium on Cluster Computing and …, 2001
432001
A reflective approach to assessing student performance in cybersecurity exercises
R Weiss, ME Locasto, J Mache
Proceedings of the 47th ACM technical symposium on computing science …, 2016
372016
Communication patterns and allocation strategies
DP Bunde, VJ Leung, J Mache
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
312004
Job scheduling for prime time vs. non-prime time
V Lo, J Mache
Proceedings. IEEE International Conference on Cluster Computing, 488-493, 2002
282002
Dispersal metrics for non-contiguous processor allocation
J Mache, V Lo
Technical Report CIS-TR-96-13, University of Oregon, 1996
281996
{EDURange}: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments
S Boesen, R Weiss, J Sullivan, ME Locasto, J Mache, E Nilsen
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
272014
Cluster computing in the classroom and integration with computing curricula 2001
A Apon, J Mache, R Buyya, H Jin
ieee Transactions on Education 47 (2), 188-195, 2004
262004
The E ects of Dispersal on Message-Passing Contention in Processor Allocation Strategies
J Mache, V Lo
251997
Top 10 hands-on cybersecurity exercises
R Weiss, J Mache, E Nilsen
Journal of Computing Sciences in Colleges 29 (1), 140-147, 2013
242013
An assessment of Gigabit Ethernet as cluster interconnect
J Mache
ICWC 99. IEEE Computer Society International Workshop on Cluster Computing …, 1999
241999
Using terminal histories to monitor student progress on hands-on exercises
J Mirkovic, A Aggarwal, D Weinman, P Lepe, J Mache, R Weiss
Proceedings of the 51st ACM technical symposium on computer science …, 2020
212020
Finding the balance between guidance and independence in cybersecurity exercises
R Weiss, F Turbak, J Mache, E Nilsen, ME Locasto
2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
192016
Request algorithms in Freenet-style peer-to-peer systems
J Mache, M Gilbert, J Guchereau, J Lesh, F Ramli, M Wilkinson
Proceedings. Second International Conference on Peer-to-Peer Computing,, 90-95, 2002
182002
Practical error correction for resource-constrained wireless networks: Unlocking the full power of the CRC
T Mandel, J Mache
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013
172013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20