| 2009 |
| 13 | EE | Yun Li,
Su-Jun Hu,
Wen-Jie Yang,
Guo-Zi Sun,
Fang-Wu Yao,
Geng Yang:
Similarity-Based Feature Selection for Learning from Examples with Continuous Values.
PAKDD 2009: 957-964 |
| 2008 |
| 12 | EE | Tao Yang,
Ye Huang,
Jianxin Chen,
Geng Yang,
Chunming Rong:
Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
ATC 2008: 555-566 |
| 11 | EE | Xinhua Wang,
Geng Yang,
Wenli Xu:
Output tracking for nonlinear non-minimum phase systems and application to PVTOL aircraft.
Int. J. Systems Science 39(1): 29-42 (2008) |
| 2007 |
| 10 | EE | Geng Yang,
Peng Jiang:
SSOR and ASSOR preconditioners for Block-Broyden method.
Applied Mathematics and Computation 188(1): 194-205 (2007) |
| 2006 |
| 9 | EE | Peng Jiang,
Geng Yang,
Chunming Rong:
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
International Conference on Computational Science (1) 2006: 794-797 |
| 8 | EE | Peng Jiang,
Geng Yang,
Chunming Rong:
Combined Method for Nonlinear Systems of Equations.
International Conference on Computational Science (4) 2006: 693-699 |
| 7 | EE | Peng Jiang,
Geng Yang:
Performance analysis of preconditioners based on Broyden method.
Applied Mathematics and Computation 178(2): 295-308 (2006) |
| 2005 |
| 6 | EE | Geng Yang,
Sirkka L. Jarvenpaa:
Trust and Radio Frequency Identification (RFID) Adoption within an Alliance.
HICSS 2005 |
| 5 | EE | Xiuying Wu,
Geng Yang,
Jiangang Shen,
Quan Zhou:
A Novel Security Model Based on Virtual Organization for Grid.
PDCAT 2005: 106-109 |
| 4 | EE | Quan Zhou,
Geng Yang,
Jiangang Shen,
Chunming Rong:
A Scalable Security Architecture for Grid.
PDCAT 2005: 89-93 |
| 2004 |
| 3 | EE | Quan Zhou,
Geng Yang:
A Grid Portal Model Based on Security and Storage Resource Proxy.
CIS 2004: 13-18 |
| 2003 |
| 2 | EE | Geng Yang,
Chunming Rong,
Yunping Dai:
A Distributed Honeypot System for Grid Security.
GCC (1) 2003: 1083-1086 |
| 1997 |
| 1 | EE | Geng Yang,
Michel C. Delfour,
Michel Fortin:
Error analysis of mixed finite elements for cylindrical shells.
Adv. Comput. Math. 7(3): 261-277 (1997) |