This map shows the geographic impact of Jens Mache's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jens Mache with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jens Mache more than expected).
This network shows the impact of papers produced by Jens Mache. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jens Mache. The network helps show where Jens Mache may publish in the future.
Co-authorship network of co-authors of Jens Mache
This figure shows the co-authorship network connecting the top 25 collaborators of Jens Mache.
A scholar is included among the top collaborators of Jens Mache based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Jens Mache. Jens Mache is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Mache, Jens & Richard Weiss. (2018). Hands-on cybersecurity exercises. Journal of computing sciences in colleges. 34(1). 231–232.
2.
Mache, Jens, et al.. (2018). Using jupyter notebooks to learn high-performance computing. Journal of computing sciences in colleges. 34(1). 180–188.5 indexed citations
3.
Weiss, Richard, Jens Mache, & Michael E. Locasto. (2017). Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance. USENIX Security Symposium.2 indexed citations
4.
Mache, Jens, et al.. (2017). Applying a framework for creating and analyzing cybersecurity questions for peer instruction. Journal of computing sciences in colleges. 33(1). 102–108.2 indexed citations
5.
Mache, Jens, et al.. (2017). Pear deck: an interactive classroom response system to encourage student engagement. Journal of computing sciences in colleges. 33(1). 156–158.1 indexed citations
6.
Weiss, Richard, Franklyn Turbak, Jens Mache, Erik Nilsen, & Michael E. Locasto. (2016). Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. USENIX Security Symposium.5 indexed citations
7.
Mandel, Travis & Jens Mache. (2016). Developing a short undergraduate introduction to online machine learning. Journal of computing sciences in colleges. 32(1). 144–150.1 indexed citations
8.
Weiss, Richard, et al.. (2016). Hands-on cybersecurity exercises for introductory classes: tutorial presentation. Journal of computing sciences in colleges. 32(1). 173–175.2 indexed citations
9.
Weiss, Richard, Jens Mache, & Michael E. Locasto. (2014). EDURange: hands-on cybersecurity exercises in the cloud. Journal of computing sciences in colleges. 30(1). 178–180.3 indexed citations
Weiss, Richard, et al.. (2013). Teaching cybersecurity through games: a cloud-based approach. Journal of computing sciences in colleges. 29(1). 113–115.4 indexed citations
12.
Weiss, Richard, Jens Mache, & Erik Nilsen. (2013). Top 10 hands-on cybersecurity exercises. Journal of computing sciences in colleges. 29(1). 140–147.11 indexed citations
Weiss, Richard & Jens Mache. (2011). Teaching security labs with web applications, buffer overflows and firewall configurations. Journal of computing sciences in colleges. 27(1). 163–170.2 indexed citations
15.
Mandel, Travis & Jens Mache. (2009). Investigating CRC Polynomials that Correct Burst Errors.. International Conference on Wireless Networks. 632–637.4 indexed citations
16.
Mache, Jens, et al.. (2007). Sensor Network Lab Exercises Using TinyOS and MicaZ Motes, Part II.. International Conference on Wireless Networks. 464–467.1 indexed citations
17.
Mache, Jens. (2006). Hands-on grid computing with Globus Toolkit 4. Journal of computing sciences in colleges. 22(2). 99–100.3 indexed citations
18.
Apon, Amy, et al.. (2004). Classroom Exercises for Grid Services. TigerPrints (Clemson University).8 indexed citations
19.
Mache, Jens, et al.. (2001). Parallel I/O Performance of PC Clusters.. PPSC.4 indexed citations
20.
Mache, Jens, et al.. (2000). Ray Tracing on Cluster Computers.. Parallel and Distributed Processing Techniques and Applications.5 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.