The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gwo-Jong Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Rong Tyan, Meng Chang Chen, Liang-Hua Chen
    Face Recognition Using a Face-Only Database: A New Approach. [Citation Graph (0, 0)][DBLP]
    ACCV (2), 1998, pp:742-749 [Conf]
  2. Gwo-Jong Yu, Yuh-Shyan Chen, Kuei-Ping Shih
    A Content-Based Image Retrieval System for Outdoor Ecology Learning: A Firefly Watching System. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:112-115 [Conf]
  3. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, Lian-Hua Chen
    Fast Face Detection via Morphology-Based Pre-processing. [Citation Graph (0, 0)][DBLP]
    ICIAP (2), 1997, pp:469-476 [Conf]
  4. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao
    A message-based cocktail watermarking system. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:1035-1038 [Conf]
  5. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, Jang-Ping Sheu
    Mean Quantization Blind Watermarking for Image Authentication. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  6. Shin-Wei Ho, Gwo-Jong Yu
    An Energy Efficient Data Storage Policy for Object Tracking Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    SUTC (2), 2006, pp:20-25 [Conf]
  7. Yuh-Shyan Chen, Tai-Chien Kao, Gwo-Jong Yu, Jang-Ping Sheu
    A Mobile Butterfly-Watching Learning System for Supporting Independent Learning. [Citation Graph (0, 0)][DBLP]
    WMTE, 2004, pp:11-18 [Conf]
  8. Gwo-Jong Yu, Chih-Yung Chang, Tzung-Shi Chen
    Task migration in n-dimensional wormhole-routed mesh multicomputers. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Architecture, 2004, v:50, n:4, pp:177-192 [Journal]
  9. Li-Fen Chen, Hong-Yuan Mark Liao, Ming-Tat Ko, Ja-Chen Lin, Gwo-Jong Yu
    A new LDA-based face recognition system which can solve the small sample size problem. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2000, v:33, n:10, pp:1713-1726 [Journal]
  10. Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, Liang-Hua Chen
    Fast face detection via morphology-based pre-processing. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2000, v:33, n:10, pp:1701-1712 [Journal]
  11. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao
    A message-based cocktail watermarking system. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2003, v:36, n:4, pp:957-968 [Journal]
  12. Gwo-Jong Yu, Chih-Chu Wu, Cheng-Ku Lai
    A Bluetooth-Based Wireless and Parallel Computation Environment for Matrix Multiplication. [Citation Graph (0, 0)][DBLP]
    DMS, 2005, pp:387-392 [Conf]
  13. En-Yi Chien, Gwo-Jong Yu
    A Power-Efficient Multi-Sink Routing Protocol for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    DMS, 2005, pp:393-396 [Conf]
  14. Tzung-Shi Chen, Gwo-Jong Yu, Hsin-Ju Chen
    A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:647-652 [Conf]
  15. Gwo-Jong Yu, Chih-Yung Chang
    An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:8, pp:1742-1753 [Journal]
  16. Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee
    Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:2, pp:728-749 [Journal]

  17. A Quorum-Based Route Cache Maintenance Protocol for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  18. A Hierarchical MDS-Based Localization Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  19. Cell-based coverage management and routing protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  20. A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  21. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002