Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Programming Skills & Maintenance
1006-4052
2009 Issue 2
The Hybrid Programming Research On the Computer Cluster Systemthe
LEI Ruilin
..............
page:5
Firewall technology and configuration examples based on Linux
HE Changlin;TANG Yongzhong
..............
page:90
To Cisco IOS type 7 passwords encryptions improvement
ZHAO Xiaofeng;LI Yuze
..............
page:92
Research and Realization of Auto-Generating Test Paper based on Genetic Algorithm
XIA Aiyue
..............
page:94
The characteristics and comparisons of certain mainstream programming language
WANG Liangying
..............
page:96
School Toilet Intellectual Water-saving System
LIU Zhengbiao
..............
page:98
Undo/Redo Operation at RichTextBox Control in VB
FAN Xiushan;WANG Yanyu;ZHANG Chen
..............
page:103
Quick Start of Text Display 400
ZHANG Wenju;CHEN Zhoulin
..............
page:107
IP Spoofing Attack: Principles, Implementation and Guards Against the Measure
LI Jiayin
..............
page:87
Exception Handling Mechanism and its Application about Struts
CHEN Shuli;ZHANG Shugui
..............
page:85
The Research of Network Threat and Security Mechanisms based on IPv6 Environment
WANG Xiaodong
..............
page:83
Mobile IPv6 Security Research
ZHANG Yongping;WANG Qingxian
..............
page:81
A Discussion of the Botnet Network Attack
ZOU Benna
..............
page:78
Computer virus' trend of development
MENG Fanjie
..............
page:77
A Fast Showing and Saving Method to JPG File in DOS
JIANG Hong
..............
page:73
To Use VB Text Box Features to Create Multimedia Devices Answer
LI Qiang;CHEN Jiazong;SONG Xiuxian
..............
page:72
Program Model for C51 Based on Event-driven
PANG Shengli
..............
page:68
Image Fusion Method Based on Multiwavelet Transforms
ZHU Linlin;WANG Gang;LIU Shuyan;SUN Fuwen;LU Wanhui
..............
page:64
Secondary Developing of Three-dimensional Bevel Wheel on AutoCAD
HU Guodong;CHANG Chunmei;TANG Hai;ZHANG Jie;YIN Jun
..............
page:61
The Network Communication Programming in LAN based on Delphi TCP/IP
Ghen Zhongju
..............
page:59
Web Development based on Django and Python
WANG Ranyang
..............
page:56
Design the NET Version of Excel with VS2005
ZHANG Genglu;ZHANG Jiaqi;CHEN Yueqiang
..............
page:54
Use LotusNotes to Design High Quality Web Pages
LU Zegang
..............
page:50
The Development and Implementation of Updating Appointment in Lovelink WAP Site
LIU Yujiang
..............
page:48
The Design and Realization of the System of the On-line Medical Treatment Insurance According to B/S Mode
YANG Lixia
..............
page:46
Using Delphi Development Bonus Payment System
CHEN Xudong;DAI Lingjun;LIU Xinyuan
..............
page:44
Logical Volume Manager (LVM) Technology Application in IBM AIX OS
HE Hongzhou
..............
page:38
Computer Management System's Function in Industry and Commerce Informationization Economical Registered Permanent Address
XIA Aihua
..............
page:36
The Matching Data for the More Excel Sheets By Access
YANG Wenbo
..............
page:33
Distributed PowerBuilder Design
YOU Mao
..............
page:31
The Study of DSS based on Data Warehouse
YUE Fang;WANG Yanling;CHANG Zhiyong
..............
page:28
Using VB and Computer Programming to Achieve Automatic Name
ZHANG Junqing
..............
page:27
The Programing to Code 7-bit Characters in PDU
GUO Lihui;MA Xiaotie;LI Kai
..............
page:24
Automation Generate Table by Word based on BCB Flat
YAN Wuqiong
..............
page:21
The Design of XML Web Services E-government Heterogeneous Platform
CHEN Rui;GUAN Jianhe
..............
page:18
The Designment to Show or Hide Dynamically the Column of GridView Control
Qu Zeming
..............
page:13
Design and Realization of the Multi-spots Sharing Transfering Software based on P2P
ZHAO Zhuanzheng
..............
page:11
E-learning Research and Implementation
GU Xionglin
..............
page:8
Research and Implementation of MD5 Anti-exhaustive Algrithm based on Java Security Package
FU Xuguang
..............
page:6