Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Programming Skills & Maintenance
1006-4052
2009 Issue 22
Design and Implementation of Dual-link Trojan Horses
tao yang
..............page:30-31,45
Development of Examination System Based on VB 6.0
gao zuo yu
..............page:32-33
On the. NET Framework to Develop Three-tier Structure Database Application
zhang qiu sheng ; zhang xing yun
..............page:59-60,87
tou gao xu zhi
..............page:封2
Design and Implementation of Course Selection System
li guan qun
..............page:130-132
The Scenario Analysis of Procedure Call of Malloc Function in Linux 2.6.11
zheng jie ; guo yi lin ; wu ai hua
..............page:24-26,37
The Application of Entropy Method and AHP in Weight Determining
lu tian chao ; kang kai
..............page:19-20,53
The Research of Graphics Conversion Between Two Kind of Solid Design Software
huang kai xuan ; lv jiang bo
..............page:93-94
Design of Opened Examination System
liu wei dong
..............page:7-8,33
Start-up Related Program Design With VB
zhou ai min ; tang wen
..............page:15-16
VRML Virtual Scenarios Jumping and 3D Modeling Interaction
liu bing ; li wei guang
..............page:105,114
ASP.NET Hacker Defense Technology Research
wang mei
..............page:106-107
Thermal Battery Discharge Stability Measurement System
ren hai jun ; wang wen qing ; ma liang ; wang dan ning
..............page:12-14
ADO.NET Database Access Technology
lan jie
..............page:46-47,67
Database Trigger Carry out Crosstabulation Flexibly
zhang cheng yong
..............page:44-45
Mersenne Prime
liu jian bo ; chen jie ; wang shuo
..............page:41-43
JDBC Database Access Technology
zhang yang
..............page:48,132
The Application of TeeChart Graph Control in Communication Monitoring Software
wu sheng yong ; zhang sheng ; sun xiao fei
..............page:88,98
Design and Implementation of Herbarium Information Collection and Manage-ment System
tang fei ; zhang kui dong ; liu hai jing ; cao zhong ying ; li dong dong
..............page:68-71,87
Design and Implementation of Web Reporter
zheng wu ; zheng wen wang
..............page:73-75
The Design and Implementation of Netshop System Database
he jian wei ; chen ying
..............page:72,91
The Web Application Research Based on EJB Technology
guo jiang ping ; chen shuang quan
..............page:89-91
Computer Network Security Strategy of Colleges Room
wu can hui
..............page:109-111
Analysis of MD5 Optimization Algorithm and Safety
zhang shuang bin
..............page:112-114
Analysis and Precautionary Measures of Unable to View Designer in Visual C#
du ling ling ; liu ai hua ; huang ling
..............page:108,118
IRBAC 2000 Model Security Research
xin hong liang ; zheng meng ; chen hong bo
..............page:115-118
Use VC2005 Development of the Multi-display Applications
zhang jian jun ; qi yan sheng
..............page:99-100
Research on Key Technology of Graph Display and History Playback for Real-time Monitoring Data
chen qi mai ; liu hai ; he chao bo ; peng li ning
..............page:95-98
The Application Research of DirectShow in Video Transcoding
xue yong
..............page:101-102,122
The Drawing of Forest Stand Height Distribution Map Combined with VB and Excel
ning jing ; hong ling xia ; zhao tian zhong
..............page:3-5,14