Jens Mache

Orcid: 0000-0003-2927-7436

According to our database1, Jens Mache authored at least 74 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

2020
Cybersecurity Across All Disciplines in 2020.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Using Terminal Histories to Monitor Student Progress on Hands-on Exercises.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

A Game Theoretic Analysis of Improvements to Tor's Resilience to Entry-Exit and End-to-End Attacks.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Hands-on Cybersecurity Exercises that are Easy to Access.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019


Peachy Parallel Assignments (EduPar 2019).
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

Measuring Student Learning On Network Testbeds.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Building Out Data Science at Small Colleges: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Jupyter Notebooks and User-Friendly HPC Access.
Proceedings of the 2018 IEEE/ACM Workshop on Education for High-Performance Computing, 2018

2017
Cybersecurity Education and Assessment in EDURange.
IEEE Secur. Priv., 2017

Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Examining PhD Student Interest in Teaching: An Analysis of 19 Years of Historical Data (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

2015
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Teaching Cybersecurity Analysis Skills in the Cloud.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2014
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Hands-on cybersecurity exercises in the EDURange framework (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching security using hands-on exercises (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Parallel programming paradigms illustrated (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
Hands-on cybersecurity exercises and the rave virtual environment (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Teaching security using hands-on exercises (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Selecting and using a parallel programming language (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Multi-course approaches to curriculum 2013's parallel and distributed computing (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Strategies for adding the emerging PDC curriculum recommendations into CS courses.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Practical error correction for resource-constrained wireless networks: unlocking the full power of the CRC.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Adding GPU Computing to Computer Organization Courses.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

2012
Hacking and the security curriculum: building community (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Sharing incremental approaches for adding parallelism to CS curricula (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

A stratified view of programming language parallelism for undergraduate CS education.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Hands-on denial of service lab exercises using SlowLoris and RUDY.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2011
Learning CUDA: lab exercises and experiences, part 2.
Proceedings of the Companion to the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

2010
Learning CUDA: lab exercises and experiences.
Proceedings of the Companion to the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

Localization in Wireless Sensor Networks with Anchors Transmitting at Multiple Power Levels.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

2009
An activity-based sensor networks course for undergraduates with sun spot devices.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Investigating CRC Polynomials that Correct Burst Errors.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

2008
Grid computing at the undergraduate level: can we do it?
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Exploiting Heterogeneity for Sensor Network Security.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Making Sensor Networks Accessible to Undergraduates Through Activity-Based Laboratory Materials.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Sensor Network Security: Elliptic Curve Cryptography on SunSPOTs.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

2007
Teaching Grid Computing: Topics, Exercises, and Experiences.
IEEE Trans. Educ., 2007

Sensor Network Lab Exercises Using TinyOS and MicaZ Motes, Part II.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols.
Proceedings of the The Second International Conference on Availability, 2007

2006
Performance Implications of Using VPN Technology for Cluster Integration and Grid Computing.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Sensor Network Lab Exercises Using TinyOS and MicaZ Motes.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

2005
The impact of spatial layout of jobs on I/O hotspots in mesh networks.
J. Parallel Distributed Comput., 2005

Performance Evaluation of Browser-based SSL VPN Gateways.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Look-Ahead Routing Reduces Wrong Turns in Freenet-Style Peer-to-Peer Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Grid computing in the undergraduate classroom topics, exercises and experiences.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Cluster computing in the classroom and integration with computing curricula 2001.
IEEE Trans. Educ., 2004

Communication Patterns and Allocation Strategies.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Look-Ahead Improves the Routing in Freenet-style Peer-to-Peer Systems.
Proceedings of the International Conference on Internet Computing, 2004

Modifying the Overlay Network of Freenet-Style Peer-to-Peer Systems after Successful Request Queries.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Peer-to-Peer Lessons for Cluster File Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Simulated Annealing and Request Algorithms for Freenet-Style Peer-to-Peer Systems.
Proceedings of the International Conference on Internet Computing, 2003

2002
Cost-effective High-performance Disk Access on PC Clusters With Commodity IDE Disks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Request Algorithms in Freenet-Style Peer-to-Peer Systems.
Proceedings of the 2nd International Conference on Peer-to-Peer Computing (P2P 2002), 2002

Job Scheduling for Prime Time vs. Non-Prime Time.
Proceedings of the 2002 IEEE International Conference on Cluster Computing (CLUSTER 2002), 2002

2001
Parallel I/O Performance of PC Clusters.
Proceedings of the Tenth SIAM Conference on Parallel Processing for Scientific Computing, 2001

Performance Evaluation of Parallel File Systems for PC Clusters and ASCI Red.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001

Cluster Computing in the Classroom: Topics, Guidelines, and Experiences.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Ray Tracing on Cluster Computers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Job Scheduling that Minimizes Network Contention due to both Communication and I/O.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1999
An Assessment of Gigabit Ethernet as Cluster Interconnect.
Proceedings of the International Workshop on Cluster Computing (IWCC '99), 1999

The Impact of Spatial Layout of Jobs on Parallel I/O Performance.
Proceedings of the Sixth Workshop on I/O in Parallel and Distributed Systems, 1999

1998
A Comparative Study of Real Workload Traces and Synthetic Workload Models for Parallel Job Scheduling.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1998


  Loading...