游國忠博士論文著述 hG2WxYk
(A) SCI 期刊論文 hG2WxYk
1. Tzung-Shi Chen, Chih-Yung Chang, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, May, “A hG2WxYk
fault-tolerant model for replication in distributed file systems,” in Proceedings of the hG2WxYk
National Science Council, Republic of China, Part A: Physical Science and Engineering hG2WxYk
(SCIE), vol. 23, no. 3, pp. 402-410. hG2WxYk
2. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, and Liang-Hua Chen, 2000, hG2WxYk
October, “Fast face detection via morphology-based pre-processing,” in Pattern Recognition hG2WxYk
(SCI), vol. 33, no. 10, pp. 1701-1712. (2008 impact factor: 2.019) hG2WxYk
3. Li-Feng Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 2000, hG2WxYk
October, “A new LDA-based face recognition system which can solve the small sample size hG2WxYk
problem,” in Pattern Recognition (SCI), vol. 33, no. 10, pp. 1713-1726. (2008 impact factor: hG2WxYk
2.019) hG2WxYk
4. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2001, July, “Mean hG2WxYk
quantization-based fragile watermarking for image authentication,” in Optical Engineering hG2WxYk
(SCI), vol. 40, no. 7, pp. 1396-1408. (2008 impact factor: 0.757) hG2WxYk
5. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2003, April, “A message-based hG2WxYk
cocktail watermarking system,” in Pattern Recognition (SCI), vol. 36, no. 4, pp.957-968. hG2WxYk
(2008 impact factor: 2.019) hG2WxYk
6. Gwo-Jong Yu, Chih-Yung Chang, and Tzung-Shi Chen, March 2004,“Task Migration in hG2WxYk
N-dimensional Wormhole-Routed Mesh Multicomputers,” in Journal of Systems hG2WxYk
Architecture (SCI), vol. 50, no. 6, pp. 177-192. (NSC 91-2213-E-156-002) (2008 impact hG2WxYk
factor: 0.49) hG2WxYk
7. Gwo-Jong Yu, Chih-Yuan Chang, Kuei-Ping Shih, and Shih-Chieh Lee, 2007 April,“Relay hG2WxYk
Reduction and Disjoint Route Construction for Scatternet for Bluetooth Radio Systems” in hG2WxYk
Journal of Network and Computer Applications(SCI), vol. 30, no. 2, pp. 728-749. (2008 hG2WxYk
impact factor: 1.265) hG2WxYk
8. Gwo-Jong Yu and Chih-Yuan Chang, 2007 June, “An Efficient Cluster-based Multi-channel hG2WxYk
Management Protocol for Wireless Ad Hoc Networks” in Computer Communications(SCI), hG2WxYk
vol. 30, no. 8, pp. 1742-1753, June 2007. (NSC 95-2524-S-156-001) (2008 impact factor: hG2WxYk
0.391) hG2WxYk
9. Gwo-Jong Yu and Chih-Yuan Chang, 2008 August, “Congestion Control of Bluetooth hG2WxYk
Radio System by Piconet Restructuring” in Journal of Network and Computer hG2WxYk
Applications(SCI), vol. 31, no. 3, pp. 201-223, August 2008. (NSC 94-2524-S-156-001, hG2WxYk
NSC 94-2213-E-156-001) (2008 impact factor: 1.265) hG2WxYk
10. Gwo-Jong Yu, 2008 May, “Adaptive Storage Policy Switching for Wireless Sensor hG2WxYk
Networks” in Wireless Personal Communications (SCI), vol. 48, no. 3, pp. 327-. 2009. hG2WxYk
(2008 impact factor: 0.23) hG2WxYk
11. Ming-Yang Su, Gwo-Jong Yu, 2008 December, “A Real-Time Network Intrusion Detection hG2WxYk
System for Large-Scale Attacks Based on an Incremental Mining Approach Computers & hG2WxYk
Security” in Computers & Security (SCI), (Accepted) (2008 impact factor: 0.737) hG2WxYk
12. Gwo-Jong Yu, 2009, “An efficient storage policy for moving target path extraction in hG2WxYk
wireless sensor networks” in IET Communications (SCI), (Accepted). hG2WxYk
(B) 期刊論文 hG2WxYk
1. Chun-Shien Lu, Gwo-Jong Yu, and Hong-Yuan Mark Liao, 2001, March, “Development of hG2WxYk
digital watermarking techniques in academia sinica: Methodology and systems,” in Journal hG2WxYk
of Computer, vol. 13, no. 1, pp. 51-66. (Invited Paper) hG2WxYk
2. Gwo-Jong Yu, Chih-Min Wang and Chih-Yung Chang, 2003, May “Role Switching hG2WxYk
Techniques for Improving Throughput over Bluetooth Wireless Networks” in Tamsui Oxford hG2WxYk
Journal of Mathematical Sciences, vol. 19, no. 1, pp. 99-115. hG2WxYk
3. Timothy, K. Shih, Chih-Yung Chang, Kuei-Ping Shih, Tai-Chien Kao, Gwo-Jong Yu, and hG2WxYk
Tzung-Shi Chen, April 2004,“Hard SCORM,” in IEEE Learning Technology Newsletter, vol. hG2WxYk
6, no. 2.pp.35-37. (NSC 93-2524-156-001) hG2WxYk
4. Gwo-Jong Yu and Wei-Chen Hwang, 2004 November, “A Minimum Delay Routing hG2WxYk
Protocol for Bluetooth Radio Networks” in Tamsui Oxford Journal of Mathematical Science, hG2WxYk
vol. 20, no. 2, pp. 291-314. (NSC 93-2213-E-156-001) hG2WxYk
5. Gwo-Jong Yu, 2008, “A Hierarchical MDS-based Localization Algorithm for Wireless hG2WxYk
Sensor Networks” in Journal of Information Technology and Applications, vol. 2, no. 4, pp. hG2WxYk
197-202. hG2WxYk
(C) 國際研討會論文 hG2WxYk
1. Gwo-Jong Yu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, 1996, June, “A new fuzzy hG2WxYk
linear mapping technique for facial feature extraction and recognition,” in Proceedings of hG2WxYk
IEEE 1996 International Conference on Neural Network, vol. 3, pp. 1179-1184, Washington, hG2WxYk
DC, USA. hG2WxYk
2. Chin-Chun Han, Hong-Yuan Mark Liao, and Gwo-Jong Yu, 1997, September, “Fast face hG2WxYk
detection via morphology-based pre-processing,” in Proceeding of 1997 International hG2WxYk
Conference on Image Analysis and Processing, vol. 2, pp. 469-476, Florence. hG2WxYk
3. Hong-Yuan Mark Liao, Chin-Chun Han, and Gwo-Jong Yu, 1997, May, hG2WxYk
“Face+hair+shoulders+background ≠ face,” in Proceeding of Workshop on 3D Computer hG2WxYk
Vision '97, pp. 91-96, Hong Kong. (Invited Paper) hG2WxYk
4. Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Long Tyan, Meng-Chang hG2WxYk
Chen, and Lian-Hua Chen, 1998, January, “Face recognition using a face-only database: a hG2WxYk
new approach,” in Third Asian Conference on Computer Vision, Hong Kong. (Invited Paper) hG2WxYk
5. Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 1998, hG2WxYk
October, “A new LDA-based face recognition system which can solve the small sample size hG2WxYk
problem,” in Proceedings of the International Conference on Computer Science and hG2WxYk
Informatics, vol. 4, pp. 282-286, North Carolina. hG2WxYk
6. Chih-Yuan Chang, Tzung-Shi Chen, Jang-Ping Sheu and Gwo-Jong Yu, 1998, “Exploitation hG2WxYk
of Partial Reuses for Vector Registers,” in Proceedings of The International Conference of hG2WxYk
Parallel and Distributed Processing Techniques and Applications,” vol. 3, pp. 1512-1518, hG2WxYk
July, Las Vegas, Nevada, USA. hG2WxYk
7. Chih-Yung Chang, Tzung-Shi Chen, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, July, hG2WxYk
“Exploitation of partial reuses for vector registers,” in Proceedings of the International hG2WxYk
Conference on Parallel and Distributed Processing Techniques and Applications, vol. 3, pp. hG2WxYk
1512-1519, Las Vegas, Nevada, USA. hG2WxYk
8. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao,