Sripanidkulchai, Kunwadee
33  results:
Search for persons X
?
2

Comprehensive Detection of Vulnerable Personal Information ..:

, In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),
 
?
5

Enabling Live Migration of Containerized Applications Acros..:

, In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications,
 
?
6

Utilizing Google Translated Reviews from Google Maps in Sen..:

, In: 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE),
 
?
7

Sweeper : Automated Data Quality Processing and Model Ge..:

, In: Proceedings of the 2019 3rd International Conference on Software and e-Business,
 
?
8

IoT-VuLock: Locking IoT Device Vulnerability with Enhanced ..:

, In: Advances in Intelligent Systems and Computing; Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2019,
 
?
9

Can We Trust Privacy Policy: Privacy Policy Classification ..:

, In: 2019 2nd International Conference of Intelligent Robotic and Control Engineering (IRCE),
 
?
10

An analysis of mobile application network behavior:

, In: Proceedings of the 12th Asian Internet Engineering Conference,
 
?
11

COMMA : coordinating the migration of multi-tier applica..:

, In: Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments,
 
?
13

Rethinking the physical layer of data center networks of th..:

Wang, Howard ; Xia, Yiting ; Bergman, Keren...
ACM SIGCOMM Computer Communication Review.  43 (2013)  3 - p. 52-58 , 2013
 
?
14

Rethinking the physical layer of data center networks of th..:

Wang, Howard ; Xia, Yiting ; Bergman, Keren...
ACM SIGCOMM Computer Communication Review.  43 (2013)  3 - p. 52-58 , 2013
 
?
15

Dealer : application-aware request splitting for interac..:

, In: Proceedings of the 8th international conference on Emerging networking experiments and technologies,
 
1-15