default search action
Jens Mache
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c70]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. SIGCSE (1) 2022: 787-793 - 2021
- [c69]Richard Weiss, Jens Mache, Elizabeth K. Hawthorne, Ambareen Siraj, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021. SIGCSE 2021: 1358 - [i1]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. CoRR abs/2112.02053 (2021) - 2020
- [c68]Jelena Mirkovic, Aashray Aggarwal, David Weinmann, Paul Lepe, Jens Mache, Richard Weiss:
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises. SIGCSE 2020: 866-872 - [c67]Richard Weiss, Xenia Mountrouidou, Stacey Watson, Jens Mache, Elizabeth K. Hawthorne, Ankur Chattopadhyay:
Cybersecurity Across All Disciplines in 2020. SIGCSE 2020: 1404 - [c66]Krisztian Gado, Jens Mache, Alexander Lotero, Lana Parezanin:
A Game Theoretic Analysis of Improvements to Tor's Resilience to Entry-Exit and End-to-End Attacks. SIGCSE 2020: 1425
2010 – 2019
- 2019
- [c65]Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann:
Measuring Student Learning On Network Testbeds. ICNP 2019: 1-2 - [c64]Ozcan Ozturk, Ben Glick, Jens Mache, David P. Bunde:
Peachy Parallel Assignments (EduPar 2019). IPDPS Workshops 2019: 342-346 - [c63]William S. Monroe, Michael Witt, Maria Pantoja, Christopher Lupo, Anne C. Elster, Joel C. Adams, Mark C. Wissink, Hang Liu, Chunhua Liao, Raphael B. Yehezkael, Benjamin H. Glick, Ravi Tripathi, Brian Smith, Jens Mache, Trilce Estrada, Debzani Deb, Ujjal Bhowmik, Yuting Chen, Dong San Choi, Zuofu Cheng, Gladys K. Andino, Pete E. Pascuzzi, Mark Daniel Ward:
Lightning Talks of EduHPC 2019. EduHPC@SC 2019: 25-31 - [c62]Richard Weiss, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019. SIGCSE 2019: 1245 - [c61]Richard Weiss, Jens Mache:
Hands-on Cybersecurity Exercises that are Easy to Access. SIGCSE 2019: 1289 - 2018
- [c60]Ben Glick, Jens Mache:
Jupyter Notebooks and User-Friendly HPC Access. EduHPC@SC 2018: 11-20 - [c59]Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, Michael E. Locasto:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). SIGCSE 2018: 1070 - [c58]Travis Mandel, Jens Mache, Richard Weiss, Peter Drake:
Building Out Data Science at Small Colleges: (Abstract Only). SIGCSE 2018: 1081 - 2017
- [j4]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Michael E. Locasto:
Cybersecurity Education and Assessment in EDURange. IEEE Secur. Priv. 15(3): 90-95 (2017) - [c57]Richard S. Weiss, Casey W. O'Brien, Xenia Mountrouidou, Jens Mache:
The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity. SIGCSE 2017: 673-674 - [c56]Travis Mandel, Jens Mache:
Examining PhD Student Interest in Teaching: An Analysis of 19 Years of Historical Data (Abstract Only). SIGCSE 2017: 713 - [c55]Richard S. Weiss, Ambareen Siraj, Jens Mache, Elizabeth K. Hawthorne, Blair Taylor, Siddharth Kaza, Michael E. Locasto:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). SIGCSE 2017: 732 - [c54]Richard S. Weiss, Jens Mache, Michael E. Locasto, Franklyn A. Turbak:
Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only). SIGCSE 2017: 743 - [c53]Richard S. Weiss, Jens Mache, Michael E. Locasto:
Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance. ASE @ USENIX Security Symposium 2017 - 2016
- [c52]Richard S. Weiss, Michael E. Locasto, Jens Mache:
A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises. SIGCSE 2016: 597-602 - [c51]Richard Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Siddharth Kaza, Ambareen Siraj:
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only). SIGCSE 2016: 709 - [c50]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Erik Nilsen, Michael E. Locasto:
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. ASE @ USENIX Security Symposium 2016 - 2015
- [c49]Richard S. Weiss, Stefan Boesen, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
Teaching Cybersecurity Analysis Skills in the Cloud. SIGCSE 2015: 332-337 - [c48]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Justin Cappos, Ambareen Siraj:
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only). SIGCSE 2015: 695 - 2014
- [c47]David P. Bunde, Michael Graf, Deyu Han, Jens Mache:
Parallel programming paradigms illustrated (abstract only). SIGCSE 2014: 722 - [c46]Richard S. Weiss, Michael E. Locasto, Jens Mache, Elizabeth K. Hawthorne, Justin Cappos:
Teaching security using hands-on exercises (abstract only). SIGCSE 2014: 736 - [c45]Richard S. Weiss, Jens Mache, Michael E. Locasto, Vincent Nestler:
Hands-on cybersecurity exercises in the EDURange framework (abstract only). SIGCSE 2014: 746 - [c44]Stefan Boesen, Richard S. Weiss, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments. CSET 2014 - 2013
- [c43]David P. Bunde, Karen L. Karavanic, Jens Mache, Christopher T. Mitchell:
Adding GPU Computing to Computer Organization Courses. IPDPS Workshops 2013: 1275-1282 - [c42]Travis Mandel, Jens Mache:
Practical error correction for resource-constrained wireless networks: unlocking the full power of the CRC. SenSys 2013: 3:1-3:14 - [c41]Richard A. Brown, Joel C. Adams, David P. Bunde, Jens Mache, Elizabeth Shoop:
Strategies for adding the emerging PDC curriculum recommendations into CS courses. SIGCSE 2013: 109-110 - [c40]Michael Graf, David P. Bunde, David Ely, David Lucas, Jens Mache, Christopher T. Mitchell, Andrei Papancea, Miriam Robinson, Ben White:
Selecting and using a parallel programming language (abstract only). SIGCSE 2013: 735 - [c39]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne:
Teaching security using hands-on exercises (abstract only). SIGCSE 2013: 754 - [c38]Richard A. Brown, Joel C. Adams, David P. Bunde, Jens Mache, Elizabeth Shoop, Michael A. Smith, Paul F. Steinberg, Matthew Wolf:
Multi-course approaches to curriculum 2013's parallel and distributed computing (abstract only). SIGCSE 2013: 755 - [c37]Richard S. Weiss, Vincent Nestler, Michael E. Locasto, Jens Mache, Brian Hay:
Hands-on cybersecurity exercises and the rave virtual environment (abstract only). SIGCSE 2013: 759 - 2012
- [c36]Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss:
Hands-on denial of service lab exercises using SlowLoris and RUDY. InfoSecCD 2012: 21-29 - [c35]Richard A. Brown, Joel C. Adams, David P. Bunde, Jens Mache, Elizabeth Shoop:
A stratified view of programming language parallelism for undergraduate CS education. SIGCSE 2012: 81-82 - [c34]Richard S. Weiss, Michael E. Locasto, Jens Mache:
Hacking and the security curriculum: building community (abstract only). SIGCSE 2012: 680 - [c33]Richard A. Brown, Elizabeth Shoop, Joel C. Adams, David P. Bunde, Jens Mache, Paul F. Steinberg, Matthew Wolf, Michael Wrinn:
Sharing incremental approaches for adding parallelism to CS curricula (abstract only). SIGCSE 2012: 747 - 2011
- [c32]Christopher T. Mitchell, Jens Mache, Karen L. Karavanic:
Learning CUDA: lab exercises and experiences, part 2. OOPSLA Companion 2011: 201-202 - 2010
- [c31]Jens Mache, Ben Perkins, William Watson:
Localization in Wireless Sensor Networks with Anchors Transmitting at Multiple Power Levels. ICWN 2010: 524-530 - [c30]Nate Anderson, Jens Mache, William Watson:
Learning CUDA: lab exercises and experiences. SPLASH/OOPSLA Companion 2010: 183-188
2000 – 2009
- 2009
- [c29]Travis Mandel, Jens Mache:
Investigating CRC Polynomials that Correct Burst Errors. ICWN 2009: 632-637 - [c28]Damon Tyman, Nirupama Bulusu, Jens Mache:
An activity-based sensor networks course for undergraduates with sun spot devices. SIGCSE 2009: 34-38 - 2008
- [c27]Jens Mache, Samuel W. Bock, James Elwell, Dennis P. Gosnell, Travis Mandel, Jonathan S. Perry-Houts:
Sensor Network Security: Elliptic Curve Cryptography on SunSPOTs. ICWN 2008: 687-692 - [c26]Jens Mache, Chieh-Yih Wan, Mark D. Yarvis:
Exploiting Heterogeneity for Sensor Network Security. SECON 2008: 591-593 - [c25]Jens Mache, Damon Tyman, Nirupama Bulusu:
Making Sensor Networks Accessible to Undergraduates Through Activity-Based Laboratory Materials. SECON 2008: 606-608 - [c24]Jens Mache, Amy W. Apon, Thomas Feilhauer, Barry Wilkinson:
Grid computing at the undergraduate level: can we do it? SIGCSE 2008: 381-382 - 2007
- [j3]Jens Mache, Amy W. Apon:
Teaching Grid Computing: Topics, Exercises, and Experiences. IEEE Trans. Educ. 50(1): 3-9 (2007) - [c23]Jens Mache, Chris Allick:
The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. ARES 2007: 606-609 - [c22]Jens Mache, Elgin Dean, Kevin Imber:
Sensor Network Lab Exercises Using TinyOS and MicaZ Motes, Part II. ICWN 2007: 464-467 - 2006
- [c21]Jens Mache, Chris Allick, John Charnas, Alex Hickman, Damon Tyman:
Sensor Network Lab Exercises Using TinyOS and MicaZ Motes. PSC 2006: 154- - [c20]Jens Mache, Damon Tyman, Andre Pinter, Chris Allick:
Performance Implications of Using VPN Technology for Cluster Integration and Grid Computing. ICNS 2006: 75 - 2005
- [j2]Jens Mache, Virginia Mary Lo, Sharad Garg:
The impact of spatial layout of jobs on I/O hotspots in mesh networks. J. Parallel Distributed Comput. 65(10): 1190-1203 (2005) - [c19]Jens Mache, Amy W. Apon:
Grid computing in the undergraduate classroom topics, exercises and experiences. CCGRID 2005: 67-73 - [c18]Jens Mache, Eric Anholt, Valentina Grigoreanu, Tim Likarish, Biljana Risteska:
Look-Ahead Routing Reduces Wrong Turns in Freenet-Style Peer-to-Peer Systems. HICSS 2005 - [c17]Jens Mache, Tim Likarish:
Performance Evaluation of Browser-based SSL VPN Gateways. International Conference on Internet Computing 2005: 82-86 - 2004
- [j1]Amy W. Apon, Jens Mache, Rajkumar Buyya, Hai Jin:
Cluster computing in the classroom and integration with computing curricula 2001. IEEE Trans. Educ. 47(2): 188-195 (2004) - [c16]Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez, Matthew Wilkinson:
Modifying the Overlay Network of Freenet-Style Peer-to-Peer Systems after Successful Request Queries. HICSS 2004 - [c15]Jens Mache, Jeff Lesh:
Look-Ahead Improves the Routing in Freenet-style Peer-to-Peer Systems. International Conference on Internet Computing 2004: 359-359 - [c14]David P. Bunde, Vitus J. Leung, Jens Mache:
Communication Patterns and Allocation Strategies. IPDPS 2004 - 2003
- [c13]Jens Mache, Jeff Lesh:
Simulated Annealing and Request Algorithms for Freenet-Style Peer-to-Peer Systems. International Conference on Internet Computing 2003: 581-590 - [c12]Jens Mache, Sharad Garg:
Peer-to-Peer Lessons for Cluster File Systems. PDPTA 2003: 1867-1871 - 2002
- [c11]Virginia Mary Lo, Jens Mache:
Job Scheduling for Prime Time vs. Non-Prime Time. CLUSTER 2002: 488-493 - [c10]Jens Mache, Melanie Gilbert, Jason Guchereau, Jeff Lesh, Felix Ramli, Matthew Wilkinson:
Request Algorithms in Freenet-Style Peer-to-Peer Systems. Peer-to-Peer Computing 2002: 90-95 - [c9]Jens Mache, Joshua Bower-Cooley, Jason Guchereau, Paul Thomas, Matthew Wilkinson:
Cost-effective High-performance Disk Access on PC Clusters With Commodity IDE Disks. PDPTA 2002: 449-455 - 2001
- [c8]Amy W. Apon, Rajkumar Buyya, Hai Jin, Jens Mache:
Cluster Computing in the Classroom: Topics, Guidelines, and Experiences. CCGRID 2001: 476-483 - [c7]Sharad Garg, Jens Mache:
Performance Evaluation of Parallel File Systems for PC Clusters and ASCI Red. CLUSTER 2001: 172-177 - [c6]Jens Mache, Joshua Bower-Cooley, Robert Broadhurst, Jennifer Cranfill, Clark Kirkman IV:
Parallel I/O Performance of PC Clusters. PP 2001 - 2000
- [c5]Jens Mache, Virginia Mary Lo, Sharad Garg:
Job Scheduling that Minimizes Network Contention due to both Communication and I/O. IPDPS 2000: 457-464 - [c4]Jens Mache, Robert Broadhurst, Jeffrey Ely:
Ray Tracing on Cluster Computers. PDPTA 2000
1990 – 1999
- 1999
- [c3]Jens Mache, Virginia Mary Lo, Marilynn Livingston, Sharad Garg:
The Impact of Spatial Layout of Jobs on Parallel I/O Performance. IOPADS 1999: 45-56 - [c2]Jens Mache:
An Assessment of Gigabit Ethernet as Cluster Interconnect. IWCC 1999: 36-42 - 1998
- [c1]Virginia Mary Lo, Jens Mache, Kurt J. Windisch:
A Comparative Study of Real Workload Traces and Synthetic Workload Models for Parallel Job Scheduling. JSSPP 1998: 25-46
Coauthor Index
aka: Richard S. Weiss
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint