default search action
Sivadon Chaisiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j3]Jonathan Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(4): 565-579 (2019) - 2017
- [c23]Sam Shute, Ryan K. L. Ko, Sivadon Chaisiri:
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. TrustCom/BigDataSE/ICESS 2017: 1131-1138 - 2016
- [c22]Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. Trustcom/BigDataSE/ISPA 2016: 527-534 - [c21]Sivadon Chaisiri, Ryan K. L. Ko:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. Trustcom/BigDataSE/ISPA 2016: 535-543 - [c20]Jeffery Garae, Ryan K. L. Ko, Sivadon Chaisiri:
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. Trustcom/BigDataSE/ISPA 2016: 1923-1930 - 2015
- [c19]Veronica Liesaputra, Sira Yongchareon, Sivadon Chaisiri:
Efficient Process Model Discovery Using Maximal Pattern Mining. BPM 2015: 441-456 - [c18]Veronica Liesaputra, Sira Yongchareon, Sivadon Chaisiri:
A Process Mining Technique Using Pattern Recognition. CAiSE Forum 2015: 57-64 - [c17]Jonathan Chase, Dusit Niyato, Sivadon Chaisiri:
Bring-Your-Own-Application (BYOA): Optimal Stochastic Application Migration in Mobile Cloud Computing. GLOBECOM 2015: 1-6 - [c16]Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. ICA3PP (Workshops and Symposiums) 2015: 57-70 - [c15]Sivadon Chaisiri, Ryan K. L. Ko, Dusit Niyato:
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management. TrustCom/BigDataSE/ISPA (1) 2015: 426-433 - [c14]Mohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko:
Trusted Tamper-Evident Data Provenance. TrustCom/BigDataSE/ISPA (1) 2015: 646-653 - 2014
- [j2]Rakpong Kaewpuang, Sivadon Chaisiri, Dusit Niyato, Bu-Sung Lee, Ping Wang:
Cooperative Virtual Machine Management in Smart Grid Environment. IEEE Trans. Serv. Comput. 7(4): 545-560 (2014) - [c13]Sira Yongchareon, Kan Ngamakeur, Chengfei Liu, Sivadon Chaisiri, Jian Yu:
A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes. OTM Workshops 2014: 639-643 - [c12]Nay Myo Sandar, Sivadon Chaisiri, Sira Yongchareon, Veronica Liesaputra:
Cloud-Based Video Monitoring Framework: An Approach Based on Software-Defined Networking for Addressing Scalability Problems. WISE Workshops 2014: 176-189 - 2013
- [b1]Sivadon Chaisiri:
Resource provisioning under uncertainty in cloud computing. Nanyang Technological University, Singapore, 2013 - [c11]Varin Khera, Chun Che Fung, Sivadon Chaisiri:
A Review of Security Risks in the Mobile Telecommunication Packet Core Network. IAIT 2013: 93-103 - [c10]Sivadon Chaisiri:
Utilizing Human Intelligence in a Crowdsourcing Marketplace for Big Data Processing. ICPADS 2013: 633-638 - [c9]Changbing Chen, Xia Yang, Zoebir Bong, Sivadon Chaisiri, Bu-Sung Lee:
A Workflow Framework for Big Data Analytics: Event Recognition in a Building. SERVICES 2013: 21-28 - 2012
- [j1]Sivadon Chaisiri, Bu-Sung Lee, Dusit Niyato:
Optimization of Resource Provisioning Cost in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 164-177 (2012) - [c8]Sivadon Chaisiri, Zoebir Bong, Chonho Lee, Bu-Sung Lee, Punyapat Sessomboon, Tanakrit Saisillapee, Tiranee Achalakul:
Workflow framework to support data analytics in cloud computing. CloudCom 2012: 610-613 - [c7]Chonho Lee, Sivadon Chaisiri, Zoebir Bong, Changbing Chen, Bu-Sung Lee:
A Demo Paper: An Analytic Workflow Framework for Green Campus. ICPADS 2012: 851-855 - [c6]Rakpong Kaewpuang, Sivadon Chaisiri, Dusit Niyato, Bu-Sung Lee, Ping Wang:
Adaptive Power Management for Data Center in Smart Grid Environment. ISPA 2012: 119-126 - 2011
- [c5]Sivadon Chaisiri, Rakpong Kaewpuang, Bu-Sung Lee, Dusit Niyato:
Cost Minimization for Provisioning Virtual Servers in Amazon Elastic Compute Cloud. MASCOTS 2011: 85-95 - 2010
- [c4]Sivadon Chaisiri, Bu-Sung Lee, Dusit Niyato:
Robust cloud resource provisioning for cloud computing environments. SOCA 2010: 1-8
2000 – 2009
- 2009
- [c3]Sivadon Chaisiri, Bu-Sung Lee, Dusit Niyato:
Optimal virtual machine placement across multiple cloud providers. APSCC 2009: 103-110 - [c2]Dusit Niyato, Sivadon Chaisiri, Bu-Sung Lee:
Economic analysis of resource market in cloud computing environment. APSCC 2009: 156-162 - [c1]Dusit Niyato, Sivadon Chaisiri, Bu-Sung Lee:
Optimal Power Management for Server Farm to Support Green Computing. CCGRID 2009: 84-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint