default search action
Gwo-Jong Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Ssu-Chi Kuai, Wen-Hwa Liao, Chih-Yung Chang, Gwo-Jong Yu:
FB-KEA: A Feature-Based Keyword Extraction Algorithm for Improving Hit Performance. ICCE-TW 2021: 1-2
2010 – 2019
- 2019
- [j17]Hongli Yu, Guilin Chen, Gwo-Jong Yu, Shenghui Zhao, Bin Yang, Jinjun Liu:
Indoor passive localisation based on reliable CSI extraction. IET Commun. 13(11): 1633-1642 (2019) - [j16]Hongli Yu, Gwo-Jong Yu, Bin Yang, Jinjun Liu:
Motion Detection with Local Linear Embedding and its Application to Indoor Device- Free Human Trajectory Tracking. J. Inf. Sci. Eng. 35(6): 1193-1208 (2019) - 2018
- [j15]Runcong Ma, Gwo-Jong Yu, Shenghui Zhao, Bin Yang:
Hierarchical CSI-Fingerprint Classification for Passive Multiperson Localization. J. Inf. Sci. Eng. 34(4): 1047-1061 (2018) - [c21]Hongli Yu, Bin Yang, Jinjun Liu, Gwo-Jong Yu:
Passive Human Trajectory Tracking Study in Indoor Environment with CSI. NaNA 2018: 372-377 - 2017
- [c20]Runcong Ma, Gwo-Jong Yu, Guilin Chen, Shenghui Zhao, Bin Yang:
Hierarchical CSI-fingerprints Classification for Passive Multi-person Localization. NaNA 2017: 112-117 - 2016
- [j14]Tzung-Shi Chen, Neng-Chung Wang, Gwo-Jong Yu, Hsin-Ju Chen:
A context-aware service framework for mobile ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 22(4): 249-264 (2016) - [c19]Gwo-Jong Yu, Kuan-Yi Yeh:
A K-Means Based Small Cell Deployment Algorithm for Wireless Access Networks. NaNA 2016: 393-398 - 2015
- [j13]Chih-Yung Chang, Guilin Chen, Gwo-Jong Yu, Tzu-Lin Wang, Tzu-Chia Wang:
TCWTP: Time-Constrained Weighted Targets Patrolling Mechanism in Wireless Mobile Sensor Networks. IEEE Trans. Syst. Man Cybern. Syst. 45(6): 901-914 (2015) - 2014
- [j12]Chih-Yung Chang, Gwo-Jong Yu, Tzu-Lin Wang, Chih-Yu Lin:
Path Construction and Visit Scheduling for Targets by Using Data Mules. IEEE Trans. Syst. Man Cybern. Syst. 44(10): 1289-1300 (2014) - 2013
- [j11]Chih-Yung Chang, Chih-Yu Lin, Gwo-Jong Yu, Chin-Hwa Kuo:
An energy-efficient hole-healing mechanism for wireless sensor networks with obstacles. Wirel. Commun. Mob. Comput. 13(4): 377-392 (2013) - [c18]Gwo-Jong Yu:
A fuzzy adaptive DRX power saving mechanism for LTE-Advanced networks. NOF 2013: 1-5 - [c17]Chi-Hsien Wang, Gwo-Jong Yu:
Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks. TrustCom/ISPA/IUCC 2013: 1762-1767 - 2012
- [c16]Chih-Yung Chang, Gwo-Jong Yu, Chih-Yu Lin, Tzu-Lin Wang:
Joint energy-balanced and full-coverage mechanism using sensing range control for maximizing network lifetime in WSNs. ICUFN 2012: 34-39 - 2010
- [j10]Gwo-Jong Yu:
A Bluetooth routing protocol supporting minimum average transmission latency. Int. J. Wirel. Mob. Comput. 4(3): 174-178 (2010)
2000 – 2009
- 2009
- [j9]Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin:
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. Comput. Secur. 28(5): 301-309 (2009) - [j8]Gwo-Jong Yu:
Adaptive Storage Policy Switching for Wireless Sensor Networks. Wirel. Pers. Commun. 48(3): 327-346 (2009) - [c15]Mei-Jhen Chen, Gwo-Jong Yu:
A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks. ISA 2009: 512-521 - 2008
- [j7]Gwo-Jong Yu, Chih-Yung Chang:
Congestion control of bluetooth radio system by piconet restructuring. J. Netw. Comput. Appl. 31(3): 201-223 (2008) - [c14]Gwo-Jong Yu:
A Quorum-Based Route Cache Maintenance Protocol for Mobile Ad-Hoc Networks. AINA 2008: 196-203 - [c13]Gwo-Jong Yu, Shao-Chun Wang:
A Hierarchical MDS-Based Localization Algorithm for Wireless Sensor Networks. AINA 2008: 748-754 - [c12]Gwo-Jong Yu:
Cell-based coverage management and routing protocol for wireless sensor networks. Mobility Conference 2008: 74 - 2007
- [j6]Gwo-Jong Yu, Chih-Yung Chang:
An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks. Comput. Commun. 30(8): 1742-1753 (2007) - [j5]Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee:
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system. J. Netw. Comput. Appl. 30(2): 728-749 (2007) - [c11]Tzung-Shi Chen, Gwo-Jong Yu, Hsin-Ju Chen:
A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks. IWCMC 2007: 647-652 - 2006
- [c10]Shin-Wei Ho, Gwo-Jong Yu:
An Energy Efficient Data Storage Policy for Object Tracking Wireless Sensor Network. SUTC (2) 2006: 20-25 - 2005
- [c9]Gwo-Jong Yu, Chih-Chu Wu, Cheng-Ku Lai:
A Bluetooth-Based Wireless and Parallel Computation Environment for Matrix Multiplication. DMS 2005: 387-392 - [c8]En-Yi Chien, Gwo-Jong Yu:
A Power-Efficient Multi-Sink Routing Protocol for Wireless Sensor Network. DMS 2005: 393-396 - 2004
- [j4]Gwo-Jong Yu, Chih-Yung Chang, Tzung-Shi Chen:
Task migration in n-dimensional wormhole-routed mesh multicomputers. J. Syst. Archit. 50(4): 177-192 (2004) - [c7]Gwo-Jong Yu, Yuh-Shyan Chen, Kuei-Ping Shih:
A Content-Based Image Retrieval System for Outdoor Ecology Learning: A Firefly Watching System. AINA (2) 2004: 112-115 - [c6]Yuh-Shyan Chen, Tai-Chien Kao, Gwo-Jong Yu, Jang-Ping Sheu:
A Mobile Butterfly-Watching Learning System for Supporting Independent Learning. WMTE 2004: 11-18 - 2003
- [j3]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao:
A message-based cocktail watermarking system. Pattern Recognit. 36(4): 957-968 (2003) - 2001
- [c5]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao:
A message-based cocktail watermarking system. ICIP (3) 2001: 1035-1038 - 2000
- [j2]Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, Liang-Hua Chen:
Fast face detection via morphology-based pre-processing. Pattern Recognit. 33(10): 1701-1712 (2000) - [j1]Li-Fen Chen, Hong-Yuan Mark Liao, Ming-Tat Ko, Ja-Chen Lin, Gwo-Jong Yu:
A new LDA-based face recognition system which can solve the small sample size problem. Pattern Recognit. 33(10): 1713-1726 (2000) - [c4]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, Jang-Ping Sheu:
Mean Quantization Blind Watermarking for Image Authentication. ICIP 2000: 706-709
1990 – 1999
- 1998
- [c3]Hong-Yuan Mark Liao, Chin-Chuan Han, Gwo-Jong Yu, Hsiao-Rong Tyan, Meng Chang Chen, Liang-Hua Chen:
Face Recognition Using a Face-Only Database: A New Approach. ACCV (2) 1998: 742-749 - 1997
- [c2]Chin-Chuan Han, Hong-Yuan Mark Liao, Gwo-Jong Yu, Liang-Hua Chen:
Fast Face Detection via Morphology-Based Pre-processing. ICIAP (2) 1997: 469-476 - 1996
- [c1]Gwo-Jong Yu, Hong-Yuan Mark Liao, Jang-Ping Sheu:
A new fuzzy linear mapping technique for facial feature extraction and recognition. ICNN 1996: 1179-1184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint