A comparative study of real workload traces and synthetic workload models for parallel job scheduling V Lo, J Mache, K Windisch Job Scheduling Strategies for Parallel Processing: IPPS/SPDP'98 Workshop …, 1998 | 141 | 1998 |
Hands-on denial of service lab exercises using slowloris and rudy E Damon, J Dale, E Laron, J Mache, N Land, R Weiss proceedings of the 2012 information security curriculum development …, 2012 | 69 | 2012 |
Teaching cybersecurity analysis skills in the cloud RS Weiss, S Boesen, JF Sullivan, ME Locasto, J Mache, E Nilsen Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 56 | 2015 |
Lightweight key distribution and management method for sensor networks CY Wan, M Yarvis, J Mache US Patent App. 11/751,643, 2008 | 56* | 2008 |
Minimizing message-passing contention in fragmentation-free processor allocation J Mache, V Lo, K Windisch Proceedings of the 10th International Conference on Parallel and Distributed …, 1997 | 56 | 1997 |
Cybersecurity education and assessment in EDURange R Weiss, F Turbak, J Mache, ME Locasto IEEE Security & Privacy 15 (03), 90-95, 2017 | 47 | 2017 |
Cluster computing in the classroom: Topics, guidelines, and experiences A Apon, R Buyya, H Jin, J Mache Proceedings First IEEE/ACM International Symposium on Cluster Computing and …, 2001 | 42 | 2001 |
A reflective approach to assessing student performance in cybersecurity exercises R Weiss, ME Locasto, J Mache Proceedings of the 47th ACM technical symposium on computing science …, 2016 | 40 | 2016 |
Communication patterns and allocation strategies DP Bunde, VJ Leung, J Mache 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 31 | 2004 |
{EDURange}: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments S Boesen, R Weiss, J Sullivan, ME Locasto, J Mache, E Nilsen 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 30 | 2014 |
Using terminal histories to monitor student progress on hands-on exercises J Mirkovic, A Aggarwal, D Weinman, P Lepe, J Mache, R Weiss Proceedings of the 51st ACM technical symposium on computer science …, 2020 | 29 | 2020 |
Disprsal Metrics for Non-contiguous Processor Allocation J Mache, V Lo University of Oregon, Department of Computer and Information Science, 1996 | 28 | 1996 |
Job scheduling for prime time vs. non-prime time V Lo, J Mache Proceedings. IEEE International Conference on Cluster Computing, 488-493, 2002 | 27 | 2002 |
Top 10 hands-on cybersecurity exercises R Weiss, J Mache, E Nilsen Journal of Computing Sciences in Colleges 29 (1), 140-147, 2013 | 26 | 2013 |
Cluster computing in the classroom and integration with computing curricula 2001 A Apon, J Mache, R Buyya, H Jin ieee Transactions on Education 47 (2), 188-195, 2004 | 25 | 2004 |
The E ects of Dispersal on Message-Passing Contention in Processor Allocation Strategies J Mache, V Lo | 25 | 1997 |
An assessment of Gigabit Ethernet as cluster interconnect J Mache ICWC 99. IEEE Computer Society International Workshop on Cluster Computing …, 1999 | 23 | 1999 |
Finding the balance between guidance and independence in cybersecurity exercises R Weiss, F Turbak, J Mache, E Nilsen, ME Locasto 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016 | 22 | 2016 |
Evaluating two approaches to assessing student progress in cybersecurity exercises V Švábenský, R Weiss, J Cook, J Vykopal, P Čeleda, J Mache, ... Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022 | 19 | 2022 |
Using jupyter notebooks to learn high-performance computing B Glick, J Mache Journal of Computing Sciences in Colleges 34 (1), 180-188, 2018 | 18 | 2018 |