游國忠博士論文著述 no`> r}C
(A) SCI 期刊論文 no`> r}C
1. Tzung-Shi Chen, Chih-Yung Chang, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, May, “A no`> r}C
fault-tolerant model for replication in distributed file systems,” in Proceedings of the no`> r}C
National Science Council, Republic of China, Part A: Physical Science and Engineering no`> r}C
(SCIE), vol. 23, no. 3, pp. 402-410. no`> r}C
2. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, and Liang-Hua Chen, 2000, no`> r}C
October, “Fast face detection via morphology-based pre-processing,” in Pattern Recognition no`> r}C
(SCI), vol. 33, no. 10, pp. 1701-1712. (2008 impact factor: 2.019) *Pmk1h2
3. Li-Feng Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 2000, *Pmk1h2
October, “A new LDA-based face recognition system which can solve the small sample size *Pmk1h2
problem,” in Pattern Recognition (SCI), vol. 33, no. 10, pp. 1713-1726. (2008 impact factor: *Pmk1h2
2.019) *Pmk1h2
4. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2001, July, “Mean *Pmk1h2
quantization-based fragile watermarking for image authentication,” in Optical Engineering *Pmk1h2
(SCI), vol. 40, no. 7, pp. 1396-1408. (2008 impact factor: 0.757) *Pmk1h2
5. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2003, April, “A message-based *Pmk1h2
cocktail watermarking system,” in Pattern Recognition (SCI), vol. 36, no. 4, pp.957-968. *Pmk1h2
(2008 impact factor: 2.019) *Pmk1h2
6. Gwo-Jong Yu, Chih-Yung Chang, and Tzung-Shi Chen, March 2004,“Task Migration in *Pmk1h2
N-dimensional Wormhole-Routed Mesh Multicomputers,” in Journal of Systems *Pmk1h2
Architecture (SCI), vol. 50, no. 6, pp. 177-192. (NSC 91-2213-E-156-002) (2008 impact *Pmk1h2
factor: 0.49) *Pmk1h2
7. Gwo-Jong Yu, Chih-Yuan Chang, Kuei-Ping Shih, and Shih-Chieh Lee, 2007 April,“Relay *Pmk1h2
Reduction and Disjoint Route Construction for Scatternet for Bluetooth Radio Systems” in *Pmk1h2
Journal of Network and Computer Applications(SCI), vol. 30, no. 2, pp. 728-749. (2008 *Pmk1h2
impact factor: 1.265) *Pmk1h2
8. Gwo-Jong Yu and Chih-Yuan Chang, 2007 June, “An Efficient Cluster-based Multi-channel *Pmk1h2
Management Protocol for Wireless Ad Hoc Networks” in Computer Communications(SCI), *Pmk1h2
vol. 30, no. 8, pp. 1742-1753, June 2007. (NSC 95-2524-S-156-001) (2008 impact factor: *Pmk1h2
0.391) *Pmk1h2
9. Gwo-Jong Yu and Chih-Yuan Chang, 2008 August, “Congestion Control of Bluetooth *Pmk1h2
Radio System by Piconet Restructuring” in Journal of Network and Computer *Pmk1h2
Applications(SCI), vol. 31, no. 3, pp. 201-223, August 2008. (NSC 94-2524-S-156-001, *Pmk1h2
NSC 94-2213-E-156-001) (2008 impact factor: 1.265) *Pmk1h2
10. Gwo-Jong Yu, 2008 May, “Adaptive Storage Policy Switching for Wireless Sensor *Pmk1h2
Networks” in Wireless Personal Communications (SCI), vol. 48, no. 3, pp. 327-. 2009. *Pmk1h2
(2008 impact factor: 0.23) *Pmk1h2
11. Ming-Yang Su, Gwo-Jong Yu, 2008 December, “A Real-Time Network Intrusion Detection *Pmk1h2
System for Large-Scale Attacks Based on an Incremental Mining Approach Computers & *Pmk1h2
Security” in Computers & Security (SCI), (Accepted) (2008 impact factor: 0.737) *Pmk1h2
12. Gwo-Jong Yu, 2009, “An efficient storage policy for moving target path extraction in *Pmk1h2
wireless sensor networks” in IET Communications (SCI), (Accepted). *Pmk1h2
(B) 期刊論文 *Pmk1h2
1. Chun-Shien Lu, Gwo-Jong Yu, and Hong-Yuan Mark Liao, 2001, March, “Development of *Pmk1h2
digital watermarking techniques in academia sinica: Methodology and systems,” in Journal *Pmk1h2
of Computer, vol. 13, no. 1, pp. 51-66. (Invited Paper) *Pmk1h2
2. Gwo-Jong Yu, Chih-Min Wang and Chih-Yung Chang, 2003, May “Role Switching *Pmk1h2
Techniques for Improving Throughput over Bluetooth Wireless Networks” in Tamsui Oxford *Pmk1h2
Journal of Mathematical Sciences, vol. 19, no. 1, pp. 99-115. *Pmk1h2
3. Timothy, K. Shih, Chih-Yung Chang, Kuei-Ping Shih, Tai-Chien Kao, Gwo-Jong Yu, and *Pmk1h2
Tzung-Shi Chen, April 2004,“Hard SCORM,” in IEEE Learning Technology Newsletter, vol. *Pmk1h2
6, no. 2.pp.35-37. (NSC 93-2524-156-001) *Pmk1h2
4. Gwo-Jong Yu and Wei-Chen Hwang, 2004 November, “A Minimum Delay Routing *Pmk1h2
Protocol for Bluetooth Radio Networks” in Tamsui Oxford Journal of Mathematical Science, *Pmk1h2
vol. 20, no. 2, pp. 291-314. (NSC 93-2213-E-156-001) *Pmk1h2
5. Gwo-Jong Yu, 2008, “A Hierarchical MDS-based Localization Algorithm for Wireless *Pmk1h2
Sensor Networks” in Journal of Information Technology and Applications, vol. 2, no. 4, pp. *Pmk1h2
197-202. *Pmk1h2
(C) 國際研討會論文 *Pmk1h2
1. Gwo-Jong Yu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, 1996, June, “A new fuzzy *Pmk1h2
linear mapping technique for facial feature extraction and recognition,” in Proceedings of *Pmk1h2
IEEE 1996 International Conference on Neural Network, vol. 3, pp. 1179-1184, Washington, *Pmk1h2
DC, USA. *Pmk1h2
2. Chin-Chun Han, Hong-Yuan Mark Liao, and Gwo-Jong Yu, 1997, September, “Fast face *Pmk1h2
detection via morphology-based pre-processing,” in Proceeding of 1997 International *Pmk1h2
Conference on Image Analysis and Processing, vol. 2, pp. 469-476, Florence. *Pmk1h2
3. Hong-Yuan Mark Liao, Chin-Chun Han, and Gwo-Jong Yu, 1997, May, *Pmk1h2
“Face+hair+shoulders+background ≠ face,” in Proceeding of Workshop on 3D Computer *Pmk1h2
Vision '97, pp. 91-96, Hong Kong. (Invited Paper) *Pmk1h2
4. Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Long Tyan, Meng-Chang *Pmk1h2
Chen, and Lian-Hua Chen, 1998, January, “Face recognition using a face-only database: a *Pmk1h2
new approach,” in Third Asian Conference on Computer Vision, Hong Kong. (Invited Paper) *Pmk1h2
5. Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 1998, *Pmk1h2
October, “A new LDA-based face recognition system which can solve the small sample size *Pmk1h2
problem,” in Proceedings of the International Conference on Computer Science and *Pmk1h2
Informatics, vol. 4, pp. 282-286, North Carolina. *Pmk1h2
6. Chih-Yuan Chang, Tzung-Shi Chen, Jang-Ping Sheu and Gwo-Jong Yu, 1998, “Exploitation *Pmk1h2
of Partial Reuses for Vector Registers,” in Proceedings of The International Conference of *Pmk1h2
Parallel and Distributed Processing Techniques and Applications,” vol. 3, pp. 1512-1518, *Pmk1h2
July, Las Vegas, Nevada, USA. *Pmk1h2
7. Chih-Yung Chang, Tzung-Shi Chen, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, July, *Pmk1h2
“Exploitation of partial reuses for vector registers,” in Proceedings of the International *Pmk1h2
Conference on Parallel and Distributed Processing Techniques and Applications, vol. 3, pp. *Pmk1h2
1512-1519, Las Vegas, Nevada, USA. *Pmk1h2
8. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao,