Sivadon Chaisiri
Sivadon Chaisiri
One New Zealand
Geverifieerd e-mailadres voor one.nz
Geciteerd door
Geciteerd door
Optimization of resource provisioning cost in cloud computing
S Chaisiri, BS Lee, D Niyato
IEEE transactions on services Computing 5 (2), 164-177, 2011
Optimal virtual machine placement across multiple cloud providers
S Chaisiri, BS Lee, D Niyato
2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 103-110, 2009
Cost minimization for provisioning virtual servers in amazon elastic compute cloud
S Chaisiri, R Kaewpuang, BS Lee, D Niyato
2011 IEEE 19th Annual International Symposium on Modelling, Analysis, and …, 2011
Optimal power management for server farm to support green computing
D Niyato, S Chaisiri, LB Sung
2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid …, 2009
Robust cloud resource provisioning for cloud computing environments
S Chaisiri, BS Lee, D Niyato
2010 IEEE International Conference on Service-Oriented Computing and …, 2010
Efficient process model discovery using maximal pattern mining
V Liesaputra, S Yongchareon, S Chaisiri
Business Process Management: 13th International Conference, BPM 2015 …, 2015
Taxonomy of Man-in-the-Middle Attacks on HTTPS
S Stricot-Tarboton, S Chaisiri, R Ko
Trustcom/BigDataSE/ISPA, 2016 IEEE 1, 527-534, 2016
A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing
J Chase, D Niyato, P Wang, S Chaisiri, RKL Ko
IEEE Transactions on Dependable and Secure Computing 16 (4), 565-579, 2017
Cooperative virtual machine management in smart grid environment
R Kaewpuang, S Chaisiri, D Niyato, BS Lee, P Wang
IEEE Transactions on Services Computing 7 (4), 545-560, 2013
Economic analysis of resource market in cloud computing environment
D Niyato, S Chaisiri, BS Lee
2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 156-162, 2009
A joint optimization approach to security-as-a-service allocation and cyber insurance management
S Chaisiri, RKL Ko, D Niyato
2015 IEEE Trustcom/bigdatase/ispa 1, 426-433, 2015
Data security in cloud computing
V Kumar, S Chaisiri, R Ko
Institution of Engineering and Technology, 2017
Trusted tamper-evident data provenance
MMB Taha, S Chaisiri, RKL Ko
2015 IEEE Trustcom/bigdatase/ispa 1, 646-653, 2015
Workflow framework to support data analytics in cloud computing
S Chaisiri, Z Bong, Chonho, BS Lee, P Sessomboon, T Saisillapee, ...
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
Profit maximization model for cloud provider based on windows azure platform
S Chaisiri, BS Lee, D Niyato
2012 9th International Conference on Electrical Engineering/Electronics …, 2012
Adaptive power management for data center in smart grid environment
R Kaewpuang, S Chaisiri, D Niyato, BS Lee, P Wang
2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles
J Garae, R Ko, S Chaisiri
Trustcom/BigDataSE/ISPA, 2016 IEEE 1, 1923-1930, 2016
A workflow framework for big data analytics: Event recognition in a building
C Lee, C Chen, X Yang, B Zoebir, S Chaisiri, BS Lee
2013 IEEE Ninth World Congress on Services, 21-28, 2013
Stratus: Towards returning data control to cloud users
RKL Ko, G Russello, R Nelson, S Pang, A Cheang, G Dobbie, ...
Algorithms and Architectures for Parallel Processing: ICA3PP International …, 2015
Attribution using keyboard row based behavioural biometrics for handedness recognition
S Shute, RKL Ko, S Chaisiri
2017 IEEE Trustcom/BigDataSE/ICESS, 1131-1138, 2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20