# | Document title | Authors | Year | Source | Cited by |
1 | Performance comparison of machine learning models for DDoS attacks detection | Khuphiran P., Leelaprute P., Uthayopas P., Ichikawa K., Watanakeesuntorn W. | 2018 | 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018
| 17 |
2 | Describing and verifying integrated services of home network systems | Leelaprute P., Nakamura M., Tsuchiya T., Matsumoto K.I., Kikuno T. | 2005 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2005,pp. 549-558 | 16 |
3 | A topological analysis of communication channels for knowledge sharing in contemporary GitHub projects | Tantisuwankul J., Nugroho Y., Kula R., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2019 | Journal of Systems and Software 158 | 13 |
4 | The effects of vectorization methods on non-functional requirements classification | Amasaki S., Leelaprute P. | 2018 | Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 ,pp. 175-182 | 12 |
5 | Detecting feature interactions in home appliance networks | Leelaprute P., Matsuo T., Tsuchiya T., Kikuno T. | 2008 | Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications ,pp. 895-903 | 11 |
6 | On detecting feature interactions in the programmable service environment of Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2004 | Computer Networks 45(5),pp. 605-624 | 11 |
7 | Extracting Insights from the Topology of the JavaScript Package Ecosystem | Lertwittayatrai N., Kula R.G., Onoue S., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2018 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2017-December,pp. 298-307 | 8 |
8 | Resolution of feature interactions in integrated services of home network system | Leelaprute P. | 2007 | 2007 Asia-Pacific Conference on Communications, APCC ,pp. 363-366 | 7 |
9 | A review and comparison of methods for determining the best analogies in analogy-based software effort estimation | Chinthanet B., Leelaprute P., Rungsawang A., Phannachitta P., Ubayashi N., Kamei Y., Matsumoto K. | 2016 | Proceedings of the ACM Symposium on Applied Computing 04-08-April-2016,pp. 1554-1557 | 6 |
10 | Semantic warnings and feature interaction in Call Processing Language on Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2003 | Proceedings - 2003 Symposium on Applications and the Internet, SAINT 2003 ,pp. 283-290 | 5 |
11 | Hajime Worm with Lifespan and Its Mitigation Evaluation Against Mirai Malware Based on Agent-Oriented Petri Net PN2 | Yamaguchi S., Leelaprute P. | 2019 | 2019 IEEE International Conference on Consumer Electronics, ICCE 2019
| 4 |
12 | Industry Application of Software Development Task Measurement System: TaskPit | Suthipornopas P., Leelaprute P., Monden A., Uwano H., Kamei Y., Ubayashi N., Araki K., Yamada K., Matsumoto K. | 2017 | IEICE Transactions on Information and Systems E100D(3),pp. 462-472 | 4 |
13 | An algorithm for automatic collation of vocabulary decks based on word frequency | Yücel Z., Supitayakul P., Monden A., Leelaprute P. | 2020 | IEICE Transactions on Information and Systems E103D(8),pp. 1865-1874 | 4 |
14 | Tour Miner: Mining system of tour plans from SNS:-Smelting function from travel records to tour routes- | Yamaguchi S., Terada T., Manaskasemsak B., Rungsawang A., Leelaprute P. | 2017 | 2017 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2017 ,pp. 239-240 | 3 |
15 | Tour Miner: Mining System of Tour Plans from SNS: Extraction of Travel Records from Check-in Information | Leelaprute P., Yamaguchi S. | 2019 | 2019 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2019 ,pp. 174-175 | 2 |
16 | Threat Analysis of Fake Virus Alerts Using WebView Monitor | Imamura Y., Orito R., Chaikaew K., Chaikaew K., Manardo C., Manardo C., Leelaprute P., Sato M., Yamauchi T. | 2019 | Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019 ,pp. 28-36 | 1 |
17 | Practical application of tour plan mining system tour miner - Web application and case study - Web a | Leelaprute P., Sothanakul P., Yamaguchi S. | 2020 | Digest of Technical Papers - IEEE International Conference on Consumer Electronics 2020-January | 1 |
18 | Web access monitoring mechanism via Android WebView for threat analysis | Imamura Y., Orito R., Uekawa H., Uekawa H., Chaikaew K., Chaikaew K., Leelaprute P., Sato M., Yamauchi T. | 2021 | International Journal of Information Security
| 1 |
19 | Investigating effect of stimulus modality on recollection rate in e-learning systems | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2020 | Proceedings - 2020 9th International Congress on Advanced Applied Informatics, IIAI-AAI 2020 ,pp. 138-141 | 1 |
20 | Task estimation for software company employees based on computer interaction logs | Pellegrin F., Pellegrin F., Yücel Z., Monden A., Leelaprute P. | 2021 | Empirical Software Engineering 26(5) | 1 |
21 | Does Coding in Pythonic Zen Peak Performance? Preliminary Experiments of Nine Pythonic Idioms at Scale | Leelaprute P., Chinthanet B., Wattanakriengkrai S., Kula R.G., Jaisri P., Ishio T. | 2022 | IEEE International Conference on Program Comprehension 2022-March,pp. 575-579 | 1 |
22 | A comparative study on vectorization methods for non-functional requirements classification | Leelaprute P., Amasaki S. | 2022 | Information and Software Technology 150 | 1 |
23 | Sparse Communication for Federated Learning | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Leelaprute P., Iida H. | 2022 | Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 ,pp. 1-8 | 1 |
24 | Evaluating semantic warnings in VoIP programmable services with open source environment | Leelaprute P., Nakamura M., Matsumoto K.I., Kikuno T. | 2003 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2003-January,pp. 552-561 | 1 |
25 | Deriving interaction-prone scenarios in feature interaction filtering with use case maps | Nakamura M., Leelaprute P., Kikuno T. | 2002 | Proceedings - International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2002-January,pp. 237-244 | 1 |
26 | Fault-prone byte-code detection using text classifier | Fujiwara T., Mizuno O., Leelaprute P. | 2015 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9459,pp. 415-430 | 0 |
27 | Lessons learned from collaborative research in software engineering: A student's perspective | Jongyindee A., Leelaprute P., Ohira M., Matsumoto K. | 2012 | Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012 ,pp. 494-497 | 0 |
28 | Definition and detection of semantic warnings for voiceXML | Leelaprute P., Kikuno T., Nakamura M., Matsumoto K.I. | 2005 | Proceedings of the IASTED International Conference on Software Engineering: part of the 23rd IASTED International Multi-Conference on Applied Informatics, SE 2005 ,pp. 267-275 | 0 |
29 | Tool support for consistency verification of UML diagrams | Phuklang S., Yokogawa T., Leelaprute P., Arimoto K. | 2017 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10611 LNCS,pp. 606-609 | 0 |
30 | Extraction of library update history using source code reuse detection | Jewmaidang K., Ishio T., Ihara A., Matsumoto K., Leelaprute P. | 2018 | IEICE Transactions on Information and Systems E101D(3),pp. 799-802 | 0 |
31 | Effect of grasping uniformity on estimation of grasping region from gaze data | Witchawanitchanun P., Yucel Z., Monden A., Leelaprute P. | 2019 | HAI 2019 - Proceedings of the 7th International Conference on Human-Agent Interaction ,pp. 265-267 | 0 |
32 | Automated Quantization and Retraining for Neural Network Models without Labeled Data | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Nakada H., Takano R., Leelaprute P., Iida H. | 2022 | IEEE Access
| 0 |
33 | An Empirical Evaluation of Competitive Programming AI: A Case Study of AlphaCode | Lertbanjongngam S., Chinthanet B., Ishio T., Kula R.G., Leelaprute P., Manaskasemsak B., Rungsawang A., Matsumoto K. | 2022 | Proceedings - 2022 IEEE 16th International Workshop on Software Clones, IWSC 2022 ,pp. 10-15 | 0 |
34 | The Convergence of Container and Traditional Virtualization: Strengths and Limitations | Li G., Takahashi K., Ichikawa K., Iida H., Nakasan C., Leelaprute P., Thiengburanathum P., Phannachitta P. | 2023 | SN Computer Science 4(4) | 0 |
35 | Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2019 | Proceedings - 2019 8th International Congress on Advanced Applied Informatics, IIAI-AAI 2019 ,pp. 226-229 | 0 |