default search action
Richard Weiss 0001
Person information
- affiliation: Evergreen State College, Olympia, WA, USA
- affiliation (former): University of Massachusetts, Amherst, MA, USA
- affiliation (PhD 1976): Harvard University, Cambridge, MA, USA
Other persons with the same name
- Richard Weiss 0002 (aka: Richard M. Weiss) — Tufts University, Medford, MA, USA (and 1 more)
- Richard Weiss 0003 — TU Wien, Vienna, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Valdemar Svábenský, Kristián Tkácik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Celeda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay:
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments. CoRR abs/2408.08531 (2024) - 2022
- [c52]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. SIGCSE (1) 2022: 787-793 - 2021
- [c51]Richard Weiss, Jens Mache, Elizabeth K. Hawthorne, Ambareen Siraj, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021. SIGCSE 2021: 1358 - [i1]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. CoRR abs/2112.02053 (2021) - 2020
- [c50]Jelena Mirkovic, Aashray Aggarwal, David Weinmann, Paul Lepe, Jens Mache, Richard Weiss:
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises. SIGCSE 2020: 866-872 - [c49]Richard Weiss, Xenia Mountrouidou, Stacey Watson, Jens Mache, Elizabeth K. Hawthorne, Ankur Chattopadhyay:
Cybersecurity Across All Disciplines in 2020. SIGCSE 2020: 1404
2010 – 2019
- 2019
- [c48]Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann:
Measuring Student Learning On Network Testbeds. ICNP 2019: 1-2 - [c47]Richard Weiss, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019. SIGCSE 2019: 1245 - [c46]Richard Weiss, Jens Mache:
Hands-on Cybersecurity Exercises that are Easy to Access. SIGCSE 2019: 1289 - 2018
- [c45]Yanyan Zhuang, Albert Rafetseder, Richard S. Weiss, Justin Cappos:
Four years experience: Making sensibility testbed work for SAS. SAS 2018: 1-6 - [c44]Richard Weiss, James Caristi, Jesse M. Heines, Aaron Koehl, Kelly Rossum:
Perfect Harmony: Team Teaching Computing & Music. SIGCSE 2018: 404-405 - [c43]Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, Michael E. Locasto:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). SIGCSE 2018: 1070 - [c42]Travis Mandel, Jens Mache, Richard Weiss, Peter Drake:
Building Out Data Science at Small Colleges: (Abstract Only). SIGCSE 2018: 1081 - 2017
- [j13]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Michael E. Locasto:
Cybersecurity Education and Assessment in EDURange. IEEE Secur. Priv. 15(3): 90-95 (2017) - [c41]Richard S. Weiss, Casey W. O'Brien, Xenia Mountrouidou, Jens Mache:
The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity. SIGCSE 2017: 673-674 - [c40]Richard S. Weiss, Ambareen Siraj, Jens Mache, Elizabeth K. Hawthorne, Blair Taylor, Siddharth Kaza, Michael E. Locasto:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). SIGCSE 2017: 732 - [c39]Richard S. Weiss, Jens Mache, Michael E. Locasto, Franklyn A. Turbak:
Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only). SIGCSE 2017: 743 - [c38]Richard S. Weiss, Jens Mache, Michael E. Locasto:
Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance. ASE @ USENIX Security Symposium 2017 - 2016
- [c37]Richard S. Weiss, Michael E. Locasto, Jens Mache:
A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises. SIGCSE 2016: 597-602 - [c36]Richard Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Siddharth Kaza, Ambareen Siraj:
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only). SIGCSE 2016: 709 - [c35]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Erik Nilsen, Michael E. Locasto:
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. ASE @ USENIX Security Symposium 2016 - 2015
- [c34]Richard S. Weiss, Stefan Boesen, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
Teaching Cybersecurity Analysis Skills in the Cloud. SIGCSE 2015: 332-337 - [c33]Sara Hooshangi, Richard S. Weiss, Justin Cappos:
Can the Security Mindset Make Students Better Testers? SIGCSE 2015: 404-409 - [c32]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Justin Cappos, Ambareen Siraj:
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only). SIGCSE 2015: 695 - [c31]Richard S. Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos:
Trust Evaluation in Mobile Devices: An Empirical Study. TrustCom/BigDataSE/ISPA (1) 2015: 25-32 - 2014
- [c30]Justin Cappos, Lai Wang, Richard S. Weiss, Yi Yang, Yanyan Zhuang:
BlurSense: Dynamic fine-grained access control for smartphone privacy. SAS 2014: 329-332 - [c29]Justin Cappos, Richard S. Weiss:
Teaching the security mindset with reference monitors. SIGCSE 2014: 523-528 - [c28]Richard S. Weiss, Michael E. Locasto, Jens Mache, Elizabeth K. Hawthorne, Justin Cappos:
Teaching security using hands-on exercises (abstract only). SIGCSE 2014: 736 - [c27]Richard S. Weiss, Jens Mache, Michael E. Locasto, Vincent Nestler:
Hands-on cybersecurity exercises in the EDURange framework (abstract only). SIGCSE 2014: 746 - [c26]Stefan Boesen, Richard S. Weiss, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments. CSET 2014 - 2013
- [c25]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne:
Teaching security using hands-on exercises (abstract only). SIGCSE 2013: 754 - [c24]Richard S. Weiss, Vincent Nestler, Michael E. Locasto, Jens Mache, Brian Hay:
Hands-on cybersecurity exercises and the rave virtual environment (abstract only). SIGCSE 2013: 759 - 2012
- [c23]Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss:
Hands-on denial of service lab exercises using SlowLoris and RUDY. InfoSecCD 2012: 21-29 - [c22]Richard S. Weiss, Michael E. Locasto, Jens Mache:
Hacking and the security curriculum: building community (abstract only). SIGCSE 2012: 680
2000 – 2009
- 2008
- [j12]Yao Guo, Vladimir Vlassov, Raksit Ashok, Richard Weiss, Csaba Andras Moritz:
Synchronization coherence: A transparent hardware mechanism for cache coherence and fine-grained synchronization. J. Parallel Distributed Comput. 68(2): 165-181 (2008) - 2006
- [c21]Vladimir Stojanovic, R. Iris Bahar, Jennifer Dworak, Richard Weiss:
A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors. DAC 2006: 705-708 - 2005
- [c20]Piyanuch Silapachote, Jerod J. Weinman, Allen R. Hanson, Marwan A. Mattar, Richard S. Weiss:
Automatic Sign Detection and Recognition in Natural Scenes. CVPR Workshops 2005: 27 - [c19]Piyanuch Silapachote, Allen R. Hanson, Richard S. Weiss:
A Hierarchical Approach to Sign Recognition. WACV/MOTION 2005: 22-28 - 2004
- [c18]Nikil Mehta, Brian Singer, R. Iris Bahar, Michael Leuchtenburg, Richard S. Weiss:
Fetch Halting on Critical Load Misses. ICCD 2004: 244-249 - 2003
- [c17]Eric Chi, A. Michael Salem, R. Iris Bahar, Richard S. Weiss:
Combining Software and Hardware Monitoring for Improved Power and Performance Tuning. Interaction between Compilers and Computer Architectures 2003: 57-64 - 2002
- [c16]Chi-Keung Luk, Robert Muth, Harish Patil, Richard Weiss, P. Geoffrey Lowney, Robert S. Cohn:
Profile-guided post-link stride prefetching. ICS 2002: 167-178 - 2000
- [c15]Richard Weiss, Nathan L. Binkert:
A Comparison of AES Candidates on the Alpha 21264. AES Candidate Conference 2000: 75-81 - [c14]Sing Bing Kang, Richard S. Weiss:
Can We Calibrate a Camera Using an Image of a Flat, Textureless Lambertian Surface? ECCV (2) 2000: 640-653
1990 – 1999
- 1999
- [j11]Sing Bing Kang, Richard S. Weiss:
Characterization of Errors in Compositing Panoramic Images. Comput. Vis. Image Underst. 73(2): 269-280 (1999) - [j10]Zhongfei Zhang, Richard S. Weiss, Allen R. Hanson:
Visual servoing control of autonomous robot calibration and navigation. J. Field Robotics 16(6): 313-328 (1999) - 1998
- [j9]Richard Szeliski, Richard Weiss:
Robust Shape Recovery from Occluding Contours Using a Linear Smoother. Int. J. Comput. Vis. 28(1): 27-44 (1998) - 1997
- [j8]Zhongfei Zhang, Richard S. Weiss, Allen R. Hanson:
Obstacle Detection Based on Qualitative and Quantitative 3D Reconstruction. IEEE Trans. Pattern Anal. Mach. Intell. 19(1): 15-26 (1997) - [c13]Sing Bing Kang, Richard S. Weiss:
Characterization of errors in compositing panoramic images. CVPR 1997: 103-109 - 1995
- [j7]Peter J. Giblin, Richard S. Weiss:
Epipolar curves on surfaces. Image Vis. Comput. 13(1): 33-44 (1995) - [j6]J. MacGregor Smith, Richard S. Weiss, Minoo Patel:
An O(N2) heuristic for steiner minimal trees in E3. Networks 26(4): 273-289 (1995) - 1994
- [j5]Roderic A. Grupen, Richard S. Weiss:
Integrated control for interpreting and manipulating the robot environment. Robotica 12(2): 165-174 (1994) - [c12]Zhongfei Zhang, Richard S. Weiss, Allen R. Hanson:
Qualitative obstacle detection. CVPR 1994: 554-559 - [c11]Peter J. Giblin, Richard S. Weiss:
Epipolar Fields on Surfaces. ECCV (1) 1994: 14-23 - [c10]Richard S. Weiss:
The Epipolar Parametrization. Object Representation in Computer Vision 1994: 101-107 - 1993
- [j4]J. Brian Burns, Richard S. Weiss, Edward M. Riseman:
View Variation of Point-Set and Line-Segment Features. IEEE Trans. Pattern Anal. Mach. Intell. 15(1): 51-68 (1993) - [c9]Richard Szeliski, Richard Weiss:
Robust shape recovery from occluding contours using a linear smoother. CVPR 1993: 666-667 - [c8]Zhongfei Zhang, Richard S. Weiss, Allen R. Hanson:
Automatic Calibration and Visual Servoing for a Robot Navigation System. ICRA (1) 1993: 14-19 - 1991
- [j3]John Dolan, Richard S. Weiss, J. MacGregor Smith:
Minimal length tree networks on the unit sphere. Ann. Oper. Res. 33(7): 501-535 (1991) - [c7]Zhongfei Zhang, Richard S. Weiss, Edward M. Riseman:
Feature matching in 360° waveforms for robot navigation. CVPR 1991: 742-743 - [c6]Roderic A. Grupen, Richard S. Weiss:
Force domain models for multifingered grasp control. ICRA 1991: 418-423 - [c5]Jiawei Hong, Xiaonan Tan, Brian Pinette, Richard S. Weiss, Edward M. Riseman:
Image-based homing. ICRA 1991: 620-625 - 1990
- [j2]Richard S. Weiss, Hiromasa Nakatani, Edward M. Riseman:
An Error Analysis for Surface Orientation from Vanishing Points. IEEE Trans. Pattern Anal. Mach. Intell. 12(12): 1179-1185 (1990) - [c4]Robert T. Collins, Richard S. Weiss:
Vanishing point calculation as a statistical inference on the unit sphere. ICCV 1990: 400-403 - [c3]J. Ross Beveridge, Richard S. Weiss, Edward M. Riseman:
Combinatorial optimization applied to variable scale 2D model matching. ICPR (1) 1990: 18-23 - [c2]Christopher I. Connolly, J. Brian Burns, Richard S. Weiss:
Path planning using Laplace's equation. ICRA 1990: 2102-2106
1980 – 1989
- 1989
- [j1]Michael Boldt, Richard S. Weiss, Edward M. Riseman:
Token-based extraction of straight lines. IEEE Trans. Syst. Man Cybern. 19(6): 1581-1594 (1989) - 1988
- [c1]Robin J. Popplestone, Richard Weiss, Yanxi Liu:
Using characteristic invariants to infer new spatial relationships from old. ICRA 1988: 1107-1112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-25 00:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint