Design and Optimization of Camera HAL Layer Based on Android (Englisch)
- Neue Suche nach: Gan, Yu
- Neue Suche nach: Hu, Wei
- Neue Suche nach: Wang, Yonghao
- Neue Suche nach: Qiu, Meikang
- Weitere Informationen zu Qiu, Meikang:
- https://orcid.org/https://orcid.org/0000-0002-1004-0140
- Neue Suche nach: Gan, Yu
- Neue Suche nach: Hu, Wei
- Neue Suche nach: Wang, Yonghao
In:
Smart Computing and Communication
: 4th International Conference, SmartCom 2019, Birmingham, UK, October 11–13, 2019, Proceedings
;
Kapitel: 29
;
296-303
;
2019
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Design and Optimization of Camera HAL Layer Based on Android
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Qiu, Meikang ( Herausgeber:in ) / Gan, Yu ( Autor:in ) / Hu, Wei ( Autor:in ) / Wang, Yonghao ( Autor:in )
-
Kongress:International Conference on Smart Computing and Communication ; 2019 ; Birmingham, United Kingdom
-
Erschienen in:Smart Computing and Communication : 4th International Conference, SmartCom 2019, Birmingham, UK, October 11–13, 2019, Proceedings ; Kapitel: 29 ; 296-303Lecture Notes in Computer Science ; 11910 ; 296-303
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:04.11.2019
-
Format / Umfang:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Survey of Deep Learning Applied to Story GenerationHou, Chenglong / Zhou, Chensong / Zhou, Kun / Sun, Jinan / Xuanyuan, Sisi et al. | 2019
- 2
-
A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel PlatesZhang, Kui / Zhou, Xiaohu / He, Heng / Wang, Yonghao / Wang, Weihao / Li, Huajian et al. | 2019
- 3
-
An Improved Prediction Model for the Network Security SituationHu, Jingjing / Ma, Dongyan / Chen, Liu / Yan, Huaizhi / Hu, Changzhen et al. | 2019
- 4
-
A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater VehiclesYu, Xiao / Wang, Kunqing / Zhang, Quanxin / Li, Yuanzhang et al. | 2019
- 5
-
An Improved Assessment Method for the Network Security RiskHu, Jingjing / Guo, Shuangshuang / Meng, Fankun / Hu, Dongsheng / Shi, Zhiyu et al. | 2019
- 6
-
A High-Performance Storage System Based with Dual RAID EngineLiu, Jingyu / Zhang, Jinrong / Li, Juan / Liu, Lu et al. | 2019
- 7
-
An Universal Perturbation Generator for Black-Box Attacks Against Object DetectorsZhao, Yuhang / Wang, Kunqing / Xue, Yuan / Zhang, Quanxin / Zhang, Xiaosong et al. | 2019
- 8
-
A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected VehicleWang, Zhao / Wang, Yanqi / Zhang, Yanan / Liu, Yangyang / Ma, Chao / Wang, Haijun et al. | 2019
- 9
-
Hierarchically Channel-Wise Attention Model for Clean and Polluted Water Images ClassificationWu, Yirui / Xiao, Yao / Feng, Jun et al. | 2019
- 10
-
Energy-Efficient Approximate Data Collection and BP-Based Reconstruction in UWSNsLiu, Yuanyuan / Wei, Xiaohui / Li, Lina / Wang, Xingwang et al. | 2019
- 11
-
I2P Anonymous Communication Network Measurement and AnalysisLiu, Likun / Zhang, Hongli / Shi, Jiantao / Yu, Xiangzhan / Xu, Haixiao et al. | 2019
- 12
-
Plot Digitizing over Big Data Using Beam SearchXu, Zhanyang / Shi, Haoyang / Liu, Xihua et al. | 2019
- 13
-
Trust-Aware Resource Provisioning for Meteorological Workflow in CloudMo, Ruichao / Qi, Lianyong / Xu, Zhanyang / Xu, Xiaolong et al. | 2019
- 14
-
Do Top Social Apps Effect Voice Call? Evidence from Propensity Score Matching MethodsJiang, Hao / Lin, Min / Liu, Bingqing / Liu, Huifang / Zeng, Yuanyuan / Nai, He / Zhang, Xiaoli / Zhao, Xianlong / Du, Wen / Ye, Haining et al. | 2019
- 15
-
Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBBYang, Kexin / Zeng, Yuanyuan / Jiang, Hao / Chen, Qimei et al. | 2019
- 16
-
Smart Custom Package Decision for Mobile Internet ServicesYang, Zhian / Zheng, Cong / Jiang, Hao / Zeng, Yuanyuan / Hu, Zhiyi / Du, Wen et al. | 2019
- 17
-
A Space Dynamic Discovery Scheme for Crowd Flow of Urban CityWang, Zhaojun / Jiang, Hao / Zhao, Xiaoyue / Zeng, Yuanyuan / Zhang, Yi / Du, Wen et al. | 2019
- 18
-
Automated Classification of Attacker Privileges Based on Deep Neural NetworkLiu, Hailong / Li, Bo et al. | 2019
- 19
-
NnD: Shallow Neural Network Based Collision Decoding in IoT CommunicationsWang, Zhe / Kong, Linghe / Chen, Guihai / Ni, Ming et al. | 2019
- 20
-
Subordinate Relationship Discovery Method Based on Directed Link PredictionNai, He / Lin, Min / Jiang, Hao / Liu, Huifang / Ye, Haining et al. | 2019
- 21
-
An Elephant Flow Detection Method Based on Machine LearningLou, Kaihao / Yang, Yongjian / Wang, Chuncai et al. | 2019
- 22
-
AI Enhanced Automatic Response System for Resisting Network ThreatsXia, Song / Qiu, Meikang / Liu, Meiqin / Zhong, Ming / Zhao, Hui et al. | 2019
- 23
-
A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-Defined NetworkingCao, Yongyi / Wu, Jing / Zhu, Bo / Jiang, Hao / Deng, Yuchuan / Luo, Wei et al. | 2019
- 24
-
A Hardware Trojan Detection Method Design Based on TensorFlowWu, Wenzhi / Wei, Ying / Ye, Ruizhe et al. | 2019
- 25
-
Resolving the Loop in High-Level SDN Program for Multi-table Pipeline CompilationWang, Xin / Kong, Linghe / Jiang, Changjun et al. | 2019
- 26
-
DC Coefficients Recovery from AC Coefficients in the JPEG Compression ScenarioQiu, Han / Zheng, Qinkai / Qiu, Meikang / Memmi, Gerard et al. | 2019
- 27
-
A Performance Evaluation Method of Coal-Fired Boiler Based on Neural NetworkChen, Yingyue / Xiao, Lijun / Hosam, Osama et al. | 2019
- 28
-
Analysis and Prediction of Commercial Big Data Based on WIFI ProbeZeng, Xiao / Guo, Hong / Liu, Zhe et al. | 2019
- 29
-
Design and Optimization of Camera HAL Layer Based on AndroidGan, Yu / Hu, Wei / Wang, Yonghao et al. | 2019
- 30
-
Music Rhythm Customized Mobile Application Based on Information ExtractionLi, Yining / Hu, Wei / Wang, Yonghao et al. | 2019
- 31
-
Computational Challenges and Opportunities in Financial ServicesSedighi, Art / Jacobson, Doug et al. | 2019
- 32
-
A Shamir Threshold Model Based Recoverable IP Watermarking SchemeXiao, Weidong / Huang, Weihong / Liang, Wei / Lei, Xia / Cai, Jiahong / Wang, Yuanming / Li, Yanting et al. | 2019
- 33
-
Applications of Machine Learning Tools in Genomics: A ReviewFracasso, Joseph L. / Ali, Md Liakat et al. | 2019
- 34
-
Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session ContextShen, Xiang / Yang, Caiming / Jiang, Zhengwei / Xie, Dong / Sun, Yingtao / Chen, Shuibiao / Li, Bo et al. | 2019
- 35
-
Coattention-Based Recurrent Neural Networks for Sentiment Analysis of Chinese TextsLiu, Lifeng / Zhang, Lizong / Zhang, Fengming / Qian, Jianguo / Zhang, Xinxin / Chen, Peidong / Li, Bo et al. | 2019
- 36
-
Design and Implementation of Small-scale Sensor Network Based on Raspberry PiZheng, Honglei / Guo, Hong / Wu, Shimin et al. | 2019
- 37
-
Research on Template-Based Factual Automatic Question Answering TechnologyHu, Wenhui / Liu, Xueyang / Xing, Chengli / Zhang, Minghui / Ma, Sen et al. | 2019
- 38
-
A Novel Scheme for Recruitment Text Categorization Based on KNN AlgorithmQin, Wenshuai / Guo, Wenjie / Liu, Xin / Zhao, Hui et al. | 2019
- 39
-
Machine Learning for Cancer Subtype Prediction with FSA MethodLiu, Yan / Wang, Xu-Dong / Qiu, Meikang / Zhao, Hui et al. | 2019
- 40
-
Autonomous Vehicle Communication in V2X Network with LoRa ProtocolCheung, YauKa / Qiu, Meikang / Liu, Meiqin et al. | 2019
- 41
-
Correction to: A Survey of Deep Learning Applied to Story GenerationHou, Chenglong / Zhou, Chensong / Zhou, Kun / Sun, Jinan / Xuanyuan, Sisi et al. | 2019