游國忠博士論文著述 }H#C<:A  
(A) SCI 期刊論文 }H#C<:A  
1. Tzung-Shi Chen, Chih-Yung Chang, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, May, “A }H#C<:A  
fault-tolerant model for replication in distributed file systems,” in Proceedings of the }H#C<:A  
National Science Council, Republic of China, Part A: Physical Science and Engineering }H#C<:A  
(SCIE), vol. 23, no. 3, pp. 402-410. }H#C<:A  
2. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, and Liang-Hua Chen, 2000, }H#C<:A  
October, “Fast face detection via morphology-based pre-processing,” in Pattern Recognition }H#C<:A  
(SCI), vol. 33, no. 10, pp. 1701-1712. (2008 impact factor: 2.019) }H#C<:A  
3. Li-Feng Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 2000, }H#C<:A  
October, “A new LDA-based face recognition system which can solve the small sample size }H#C<:A  
problem,” in Pattern Recognition (SCI), vol. 33, no. 10, pp. 1713-1726. (2008 impact factor: }H#C<:A  
2.019) }H#C<:A  
4. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2001, July, “Mean }H#C<:A  
quantization-based fragile watermarking for image authentication,” in Optical Engineering }H#C<:A  
(SCI), vol. 40, no. 7, pp. 1396-1408. (2008 impact factor: 0.757) }H#C<:A  
5. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2003, April, “A message-based }H#C<:A  
cocktail watermarking system,” in Pattern Recognition (SCI), vol. 36, no. 4, pp.957-968. }H#C<:A  
(2008 impact factor: 2.019) }H#C<:A  
6. Gwo-Jong Yu, Chih-Yung Chang, and Tzung-Shi Chen, March 2004,“Task Migration in }H#C<:A  
N-dimensional Wormhole-Routed Mesh Multicomputers,” in Journal of Systems }H#C<:A  
Architecture (SCI), vol. 50, no. 6, pp. 177-192. (NSC 91-2213-E-156-002) (2008 impact }H#C<:A  
factor: 0.49) }H#C<:A  
7. Gwo-Jong Yu, Chih-Yuan Chang, Kuei-Ping Shih, and Shih-Chieh Lee, 2007 April,“Relay }H#C<:A  
Reduction and Disjoint Route Construction for Scatternet for Bluetooth Radio Systems” in }H#C<:A  
Journal of Network and Computer Applications(SCI), vol. 30, no. 2, pp. 728-749. (2008 }H#C<:A  
impact factor: 1.265) }H#C<:A  
8. Gwo-Jong Yu and Chih-Yuan Chang, 2007 June, “An Efficient Cluster-based Multi-channel }H#C<:A  
Management Protocol for Wireless Ad Hoc Networks” in Computer Communications(SCI), }H#C<:A  
vol. 30, no. 8, pp. 1742-1753, June 2007. (NSC 95-2524-S-156-001) (2008 impact factor: }H#C<:A  
0.391) }H#C<:A  
9. Gwo-Jong Yu and Chih-Yuan Chang, 2008 August, “Congestion Control of Bluetooth }H#C<:A  
Radio System by Piconet Restructuring” in Journal of Network and Computer }H#C<:A  
Applications(SCI), vol. 31, no. 3, pp. 201-223, August 2008. (NSC 94-2524-S-156-001, }H#C<:A  
NSC 94-2213-E-156-001) (2008 impact factor: 1.265) }H#C<:A  
10. Gwo-Jong Yu, 2008 May, “Adaptive Storage Policy Switching for Wireless Sensor }H#C<:A  
Networks” in Wireless Personal Communications (SCI), vol. 48, no. 3, pp. 327-. 2009. }H#C<:A  
(2008 impact factor: 0.23) }H#C<:A  
11. Ming-Yang Su, Gwo-Jong Yu, 2008 December, “A Real-Time Network Intrusion Detection }H#C<:A  
System for Large-Scale Attacks Based on an Incremental Mining Approach Computers & }H#C<:A  
Security” in Computers & Security (SCI), (Accepted) (2008 impact factor: 0.737) }H#C<:A  
12. Gwo-Jong Yu, 2009, “An efficient storage policy for moving target path extraction in }H#C<:A  
wireless sensor networks” in IET Communications (SCI), (Accepted). }H#C<:A  
(B) 期刊論文 }H#C<:A  
1. Chun-Shien Lu, Gwo-Jong Yu, and Hong-Yuan Mark Liao, 2001, March, “Development of }H#C<:A  
digital watermarking techniques in academia sinica: Methodology and systems,” in Journal }H#C<:A  
of Computer, vol. 13, no. 1, pp. 51-66. (Invited Paper) }H#C<:A  
2. Gwo-Jong Yu, Chih-Min Wang and Chih-Yung Chang, 2003, May “Role Switching }H#C<:A  
Techniques for Improving Throughput over Bluetooth Wireless Networks” in Tamsui Oxford }H#C<:A  
Journal of Mathematical Sciences, vol. 19, no. 1, pp. 99-115. }H#C<:A  
3. Timothy, K. Shih, Chih-Yung Chang, Kuei-Ping Shih, Tai-Chien Kao, Gwo-Jong Yu, and }H#C<:A  
Tzung-Shi Chen, April 2004,“Hard SCORM,” in IEEE Learning Technology Newsletter, vol. }H#C<:A  
6, no. 2.pp.35-37. (NSC 93-2524-156-001) }H#C<:A  
4. Gwo-Jong Yu and Wei-Chen Hwang, 2004 November, “A Minimum Delay Routing +U1fa9NSn  
Protocol for Bluetooth Radio Networks” in Tamsui Oxford Journal of Mathematical Science, +U1fa9NSn  
vol. 20, no. 2, pp. 291-314. (NSC 93-2213-E-156-001) +U1fa9NSn  
5. Gwo-Jong Yu, 2008, “A Hierarchical MDS-based Localization Algorithm for Wireless +U1fa9NSn  
Sensor Networks” in Journal of Information Technology and Applications, vol. 2, no. 4, pp. +U1fa9NSn  
197-202. +U1fa9NSn  
(C) 國際研討會論文 +U1fa9NSn  
1. Gwo-Jong Yu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, 1996, June, “A new fuzzy +U1fa9NSn  
linear mapping technique for facial feature extraction and recognition,” in Proceedings of +U1fa9NSn  
IEEE 1996 International Conference on Neural Network, vol. 3, pp. 1179-1184, Washington, +U1fa9NSn  
DC, USA. +U1fa9NSn  
2. Chin-Chun Han, Hong-Yuan Mark Liao, and Gwo-Jong Yu, 1997, September, “Fast face +U1fa9NSn  
detection via morphology-based pre-processing,” in Proceeding of 1997 International +U1fa9NSn  
Conference on Image Analysis and Processing, vol. 2, pp. 469-476, Florence. +U1fa9NSn  
3. Hong-Yuan Mark Liao, Chin-Chun Han, and Gwo-Jong Yu, 1997, May, +U1fa9NSn  
“Face+hair+shoulders+background ≠ face,” in Proceeding of Workshop on 3D Computer +U1fa9NSn  
Vision '97, pp. 91-96, Hong Kong. (Invited Paper) +U1fa9NSn  
4. Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Long Tyan, Meng-Chang +U1fa9NSn  
Chen, and Lian-Hua Chen, 1998, January, “Face recognition using a face-only database: a +U1fa9NSn  
new approach,” in Third Asian Conference on Computer Vision, Hong Kong. (Invited Paper) +U1fa9NSn  
5. Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 1998, +U1fa9NSn  
October, “A new LDA-based face recognition system which can solve the small sample size +U1fa9NSn  
problem,” in Proceedings of the International Conference on Computer Science and +U1fa9NSn  
Informatics, vol. 4, pp. 282-286, North Carolina. +U1fa9NSn  
6. Chih-Yuan Chang, Tzung-Shi Chen, Jang-Ping Sheu and Gwo-Jong Yu, 1998, “Exploitation +U1fa9NSn  
of Partial Reuses for Vector Registers,” in Proceedings of The International Conference of +U1fa9NSn  
Parallel and Distributed Processing Techniques and Applications,” vol. 3, pp. 1512-1518, +U1fa9NSn  
July, Las Vegas, Nevada, USA. +U1fa9NSn  
7. Chih-Yung Chang, Tzung-Shi Chen, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, July, +U1fa9NSn  
“Exploitation of partial reuses for vector registers,” in Proceedings of the International +U1fa9NSn  
Conference on Parallel and Distributed Processing Techniques and Applications, vol. 3, pp. +U1fa9NSn  
1512-1519, Las Vegas, Nevada, USA. +U1fa9NSn  
8. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao,