Security Strategy for Computer System
lou hong feng 1; wu zi heng 1; zheng ding liang 2; wang we bo 1 (1 dept. of electronic information and electrical engineering; sichuan university of science and technology; 2 silver lake co.chengdu 610000 sichuan china)
..............page:24-27
..............page:55-58,72
..............page:35-37,44
Dimensional Analysis of OSCILLATOR x~(2k+1)
huang xiao li 1; chen hai yan 2 (1 dept. of electronics and information engineering; sichuan university of science and technology; chengdu 610039 sichuan china 2 dept. of mathematics & physics; jianghan petroleum university; jingzhou 434102 hubei china)
..............page:22-23,27
..............page:38-40,44
..............page:64-65,75
..............page:1-3,18
Culture,Identification and Growth characteristics of Cell IEC-6
chen xiang gui 1; rui guang wei 1; ren chuan hong 1; wang rui shu 2; wang zhi min 1; ran xin ze 3 (1 department of bioengineering engineering; sichuan university of science and technology; chengdu 610039 sichuan china; 2 school of & nb sp; public health; west china university of medical&nb sp; science chengdu 610041 sichuan china; 3 department of predictive medicine; third military medical&nb sp; university; chongqing 400038 china)
..............page:41-44
Programming Norm with PowerBuider
he zhi guo 1; 2 ; cao yu dong 2 (1 dept.of computer science & technology; zhejiang university; hangzhou 310027 zhejiang china; 2 dept.of electronic information; panzhihua college; panzhihua 617000 sichuan china)
..............page:28-31
Sample Interpolation in AR Model and Its Analysis
li xu dong 1; zhang yong xiang 2 (1 dept of computer science and engineering of sichuan university of s cience and technology; 2 dept of mechanical engineering and automation of sichuan university of scie nce and technology; chengdu 610039 sichuan china)
..............page:79-82
..............page:98-100