A comparative study of real workload traces and synthetic workload models for parallel job scheduling V Lo, J Mache, K Windisch Workshop on job scheduling strategies for parallel processing, 25-46, 1998 | 133 | 1998 |
Minimizing message-passing contention in fragmentation-free processor allocation J Mache, V Lo, K Windisch Proc. 10th Intern. Conf. Parallel and Distributed Computing Systems, 120-124, 1997 | 50 | 1997 |
Hands-on denial of service lab exercises using slowloris and rudy E Damon, J Dale, E Laron, J Mache, N Land, R Weiss proceedings of the 2012 information security curriculum development …, 2012 | 48 | 2012 |
Lightweight key distribution and management method for sensor networks C Wan, M Yarvis, J Mache US Patent App. 11/751,643, 2008 | 42* | 2008 |
Cluster computing in the classroom: Topics, guidelines, and experiences A Apon, R Buyya, H Jin, J Mache Proceedings First IEEE/ACM International Symposium on Cluster Computing and …, 2001 | 40 | 2001 |
Teaching cybersecurity analysis skills in the cloud RS Weiss, S Boesen, JF Sullivan, ME Locasto, J Mache, E Nilsen Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 35 | 2015 |
Communication patterns and allocation strategies DP Bunde, VJ Leung, J Mache 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 29 | 2004 |
Job scheduling for prime time vs. non-prime time V Lo, J Mache Proceedings. IEEE International Conference on Cluster Computing, 488-493, 2002 | 29 | 2002 |
Dispersal metrics for non-contiguous processor allocation J Mache, V Lo Technical Report CIS-TR-96-13, University of Oregon, 1996 | 29 | 1996 |
Cluster computing in the classroom and integration with computing curricula 2001 A Apon, J Mache, R Buyya, H Jin ieee Transactions on Education 47 (2), 188-195, 2004 | 25 | 2004 |
The E ects of Dispersal on Message-Passing Contention in Processor Allocation Strategies J Mache, V Lo | 25 | 1997 |
An assessment of Gigabit Ethernet as cluster interconnect J Mache ICWC 99. IEEE Computer Society International Workshop on Cluster Computing …, 1999 | 20 | 1999 |
Edurange: Meeting the pedagogical challenges of student participation in cybertraining environments S Boesen, R Weiss, J Sullivan, ME Locasto, J Mache, E Nilsen 7th Workshop on Cyber Security Experimentation and Test ({CSET} 14), 2014 | 19 | 2014 |
Top 10 hands-on cybersecurity exercises R Weiss, J Mache, E Nilsen Journal of Computing Sciences in Colleges 29 (1), 140-147, 2013 | 19 | 2013 |
A reflective approach to assessing student performance in cybersecurity exercises R Weiss, ME Locasto, J Mache Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016 | 18 | 2016 |
Cybersecurity education and assessment in EDURange R Weiss, F Turbak, J Mache, ME Locasto IEEE Annals of the History of Computing 15 (03), 90-95, 2017 | 16 | 2017 |
Request algorithms in Freenet-style peer-to-peer systems J Mache, M Gilbert, J Guchereau, J Lesh, F Ramli, M Wilkinson Proceedings. Second International Conference on Peer-to-Peer Computing,, 90-95, 2002 | 16 | 2002 |
Practical error correction for resource-constrained wireless networks: Unlocking the full power of the CRC T Mandel, J Mache Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013 | 15 | 2013 |
Exploiting heterogeneity for sensor network security J Mache, CY Wan, M Yarvis 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2008 | 14 | 2008 |
Teaching grid computing: topics, exercises, and experiences J Mache, A Apon IEEE Transactions on Education 50 (1), 3-9, 2007 | 14 | 2007 |