游國忠博士論文著述 -zC]^Ho@
(A) SCI 期刊論文 -zC]^Ho@
1. Tzung-Shi Chen, Chih-Yung Chang, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, May, “A -zC]^Ho@
fault-tolerant model for replication in distributed file systems,” in Proceedings of the -zC]^Ho@
National Science Council, Republic of China, Part A: Physical Science and Engineering -zC]^Ho@
(SCIE), vol. 23, no. 3, pp. 402-410. -zC]^Ho@
2. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, and Liang-Hua Chen, 2000, -zC]^Ho@
October, “Fast face detection via morphology-based pre-processing,” in Pattern Recognition -zC]^Ho@
(SCI), vol. 33, no. 10, pp. 1701-1712. (2008 impact factor: 2.019) -zC]^Ho@
3. Li-Feng Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 2000, -zC]^Ho@
October, “A new LDA-based face recognition system which can solve the small sample size -zC]^Ho@
problem,” in Pattern Recognition (SCI), vol. 33, no. 10, pp. 1713-1726. (2008 impact factor: -zC]^Ho@
2.019) -zC]^Ho@
4. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2001, July, “Mean -zC]^Ho@
quantization-based fragile watermarking for image authentication,” in Optical Engineering -zC]^Ho@
(SCI), vol. 40, no. 7, pp. 1396-1408. (2008 impact factor: 0.757) -zC]^Ho@
5. Gwo-Jong Yu, Chun-Shien Lu, and Hong-Yuan Mark Liao, 2003, April, “A message-based -zC]^Ho@
cocktail watermarking system,” in Pattern Recognition (SCI), vol. 36, no. 4, pp.957-968. -zC]^Ho@
(2008 impact factor: 2.019) -zC]^Ho@
6. Gwo-Jong Yu, Chih-Yung Chang, and Tzung-Shi Chen, March 2004,“Task Migration in -zC]^Ho@
N-dimensional Wormhole-Routed Mesh Multicomputers,” in Journal of Systems -zC]^Ho@
Architecture (SCI), vol. 50, no. 6, pp. 177-192. (NSC 91-2213-E-156-002) (2008 impact -zC]^Ho@
factor: 0.49) -zC]^Ho@
7. Gwo-Jong Yu, Chih-Yuan Chang, Kuei-Ping Shih, and Shih-Chieh Lee, 2007 April,“Relay -zC]^Ho@
Reduction and Disjoint Route Construction for Scatternet for Bluetooth Radio Systems” in -zC]^Ho@
Journal of Network and Computer Applications(SCI), vol. 30, no. 2, pp. 728-749. (2008 -zC]^Ho@
impact factor: 1.265) -zC]^Ho@
8. Gwo-Jong Yu and Chih-Yuan Chang, 2007 June, “An Efficient Cluster-based Multi-channel -zC]^Ho@
Management Protocol for Wireless Ad Hoc Networks” in Computer Communications(SCI), -zC]^Ho@
vol. 30, no. 8, pp. 1742-1753, June 2007. (NSC 95-2524-S-156-001) (2008 impact factor: -zC]^Ho@
0.391) -zC]^Ho@
9. Gwo-Jong Yu and Chih-Yuan Chang, 2008 August, “Congestion Control of Bluetooth -zC]^Ho@
Radio System by Piconet Restructuring” in Journal of Network and Computer -zC]^Ho@
Applications(SCI), vol. 31, no. 3, pp. 201-223, August 2008. (NSC 94-2524-S-156-001, -zC]^Ho@
NSC 94-2213-E-156-001) (2008 impact factor: 1.265) -zC]^Ho@
10. Gwo-Jong Yu, 2008 May, “Adaptive Storage Policy Switching for Wireless Sensor -zC]^Ho@
Networks” in Wireless Personal Communications (SCI), vol. 48, no. 3, pp. 327-. 2009. -zC]^Ho@
(2008 impact factor: 0.23) -zC]^Ho@
11. Ming-Yang Su, Gwo-Jong Yu, 2008 December, “A Real-Time Network Intrusion Detection -zC]^Ho@
System for Large-Scale Attacks Based on an Incremental Mining Approach Computers & -zC]^Ho@
Security” in Computers & Security (SCI), (Accepted) (2008 impact factor: 0.737) -zC]^Ho@
12. Gwo-Jong Yu, 2009, “An efficient storage policy for moving target path extraction in -zC]^Ho@
wireless sensor networks” in IET Communications (SCI), (Accepted). -zC]^Ho@
(B) 期刊論文 -zC]^Ho@
1. Chun-Shien Lu, Gwo-Jong Yu, and Hong-Yuan Mark Liao, 2001, March, “Development of -zC]^Ho@
digital watermarking techniques in academia sinica: Methodology and systems,” in Journal -zC]^Ho@
of Computer, vol. 13, no. 1, pp. 51-66. (Invited Paper) -zC]^Ho@
2. Gwo-Jong Yu, Chih-Min Wang and Chih-Yung Chang, 2003, May “Role Switching -zC]^Ho@
Techniques for Improving Throughput over Bluetooth Wireless Networks” in Tamsui Oxford -zC]^Ho@
Journal of Mathematical Sciences, vol. 19, no. 1, pp. 99-115. -zC]^Ho@
3. Timothy, K. Shih, Chih-Yung Chang, Kuei-Ping Shih, Tai-Chien Kao, Gwo-Jong Yu, and -zC]^Ho@
Tzung-Shi Chen, April 2004,“Hard SCORM,” in IEEE Learning Technology Newsletter, vol. -zC]^Ho@
6, no. 2.pp.35-37. (NSC 93-2524-156-001) -zC]^Ho@
4. Gwo-Jong Yu and Wei-Chen Hwang, 2004 November, “A Minimum Delay Routing -zC]^Ho@
Protocol for Bluetooth Radio Networks” in Tamsui Oxford Journal of Mathematical Science, -zC]^Ho@
vol. 20, no. 2, pp. 291-314. (NSC 93-2213-E-156-001) -zC]^Ho@
5. Gwo-Jong Yu, 2008, “A Hierarchical MDS-based Localization Algorithm for Wireless -zC]^Ho@
Sensor Networks” in Journal of Information Technology and Applications, vol. 2, no. 4, pp. -zC]^Ho@
197-202. -zC]^Ho@
(C) 國際研討會論文 -zC]^Ho@
1. Gwo-Jong Yu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, 1996, June, “A new fuzzy -zC]^Ho@
linear mapping technique for facial feature extraction and recognition,” in Proceedings of -zC]^Ho@
IEEE 1996 International Conference on Neural Network, vol. 3, pp. 1179-1184, Washington, -zC]^Ho@
DC, USA. -zC]^Ho@
2. Chin-Chun Han, Hong-Yuan Mark Liao, and Gwo-Jong Yu, 1997, September, “Fast face -zC]^Ho@
detection via morphology-based pre-processing,” in Proceeding of 1997 International -zC]^Ho@
Conference on Image Analysis and Processing, vol. 2, pp. 469-476, Florence. -zC]^Ho@
3. Hong-Yuan Mark Liao, Chin-Chun Han, and Gwo-Jong Yu, 1997, May, -zC]^Ho@
“Face+hair+shoulders+background ≠ face,” in Proceeding of Workshop on 3D Computer -zC]^Ho@
Vision '97, pp. 91-96, Hong Kong. (Invited Paper) -zC]^Ho@
4. Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Long Tyan, Meng-Chang -zC]^Ho@
Chen, and Lian-Hua Chen, 1998, January, “Face recognition using a face-only database: a -zC]^Ho@
new approach,” in Third Asian Conference on Computer Vision, Hong Kong. (Invited Paper) -zC]^Ho@
5. Li-Fen Chen, Hong-Yuan Mark Liao, Ja-Chen Lin, Ming Tat Ko, and Gwo-Jong Yu, 1998, -zC]^Ho@
October, “A new LDA-based face recognition system which can solve the small sample size -zC]^Ho@
problem,” in Proceedings of the International Conference on Computer Science and -zC]^Ho@
Informatics, vol. 4, pp. 282-286, North Carolina. -zC]^Ho@
6. Chih-Yuan Chang, Tzung-Shi Chen, Jang-Ping Sheu and Gwo-Jong Yu, 1998, “Exploitation -zC]^Ho@
of Partial Reuses for Vector Registers,” in Proceedings of The International Conference of -zC]^Ho@
Parallel and Distributed Processing Techniques and Applications,” vol. 3, pp. 1512-1518, -zC]^Ho@
July, Las Vegas, Nevada, USA. -zC]^Ho@
7. Chih-Yung Chang, Tzung-Shi Chen, Jang-Ping Sheu, and Gwo-Jong Yu, 1999, July, -zC]^Ho@
“Exploitation of partial reuses for vector registers,” in Proceedings of the International -zC]^Ho@
Conference on Parallel and Distributed Processing Techniques and Applications, vol. 3, pp. -zC]^Ho@
1512-1519, Las Vegas, Nevada, USA. -zC]^Ho@
8. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao,