Author of the publication

A New Deep Learning-Based Food Recognition System for Dietary Assessment on An Edge Computing Service Infrastructure.

, , , , , , , and . IEEE Trans. Serv. Comput., 11 (2): 249-261 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying respiratory sounds using electronic stethoscope., , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-8. IEEE, (2017)Research on concurrent actions in multi-agent systems., , and . ACM SIGSOFT Softw. Eng. Notes, 23 (4): 83 (1998)Beyond Smartphone Overuse: Identifying Addictive Mobile Apps., , , and . CHI Extended Abstracts, page 2821-2828. ACM, (2016)Design and Implementation of a Large-Scale Context Fusion Network., , and . MobiQuitous, page 246-255. IEEE Computer Society, (2004)Is faster better?: a study of video playback speed., , , and . LAK, page 260-269. ACM, (2020)The conference was reorganized to a virtual event due to the international COVID-19 health crisis..Context Aggregation and Dissemination in Ubiquitous Computing Systems., and . WMCSA, page 105-. IEEE Computer Society, (2002)A Toolkit for Usability Testing of Mobile Applications., , , , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 226-245. Springer, (2011)Respiratory Sounds Feature Learning with Deep Convolutional Neural Networks., , , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 170-177. IEEE Computer Society, (2017)DeepFood: Deep Learning-Based Food Image Recognition for Computer-Aided Dietary Assessment., , , , , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 37-48. Springer, (2016)Detecting Wormhole Attacks in Wireless Sensor Networks., , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)