Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Programming Skills & Maintenance
1006-4052
2010 Issue 4
Analysis of WCDMA Downlink Power Control Problems
liu hai ying
..............page:33-34
Application of SQL Triggers in Database Design
wei jin mao
..............page:73-74
Discussion of the Web Service Technology in the SOA
lv hong wei
..............page:75,78
Research on Semi-Structured Data Model Integration
yu chen zuo
..............page:67-68
Skills and Methods of Dynamic Drop-down Menu
xia zuo
..............page:14-16
Genetic Algorithm and Application in Data Mining
xu bo
..............page:9-11,16
A New Design of Encoding and Decoding of Cyclic Codes
liu jia xiang ; yin wei wei
..............page:20-23
Fast Image Processing Based on Scanline of Delphi
zhang yu
..............page:97-98,103
Based on ORM to Persistence Layer Framework of Hibernate
yang yi bing
..............page:30-32
Clinic Management Information System Designation and Implement
sun liang dong
..............page:26-27,39
Design the Software Test Case
li jie
..............page:17-19,23
Implementation of Image Special Effect Processing Using C#
zhao xiao mei
..............page:99-103
Indicator\'s Threshold and Explains in Detail
chen wen yuan
..............page:130-131
Two Complex Compound Retrieval Problem\'s Solution Based on ASP.NET
li wen xing ; deng zhao jun
..............page:82-83
Explore Key Issues of Database Outer Security Technology
yang fan ; hou ya li
..............page:106-107
Realizing the Dynamic Demonstration of Sequential Search Algorithm Using C#
sun yi xin ; zhang lan xia
..............page:45-46
Research of MYSQL Cluster
wang ai ning
..............page:53-54,66
Easy Management Students\' Achievement with Excel
cai qi mao ; yuan mei hua
..............page:69-72
Windows XP System Network Share Common Problems
chen hai fei
..............page:88-90
Discussion on the Case Teaching of "Data Structure"
liu zuo ; sun jin xia ; tan zhen zuo
..............page:128-129
General Computer Virus Code Analysis and Detection Methods
zuo xiao cui ; zhang xue liang
..............page:111-113
Communication in QNX Real-time System Using VC
yu yang
..............page:84-86
C# Testing Project Application in Database Unit Tests
ma xiao long
..............page:64-66
A Diameter-based Access Security Mechanism for IMS
chen xue zhao
..............page:108-109
The Design and Implementation of Component-based Performance Monitoring Information System
jia yong sheng ; lv xiu jian ; li li juan
..............page:62-63
Research of Distributed Hash Find Model
zuo wen gang ; yu chun ling
..............page:3-4
Security Analysis of Kerberos Protocol Based on SST
yang jie
..............page:110,113
Mixed Programme and Optimization of C51 and Compile Language
shi da fa ; wang hui
..............page:42-44
The Research of Network Security Mechanism of Router
liu xiong bing
..............page:104-105,109
ASP Prevention Injection Attack Methods
zhang yan gang
..............page:116-117
DES Algorithm IP Core Pipeline Design
wang kai yuan ; yuan wei ; meng xiang zuo
..............page:24-25,34
Recognition of User\'s Keystroke Features Based on Hierarchical Clustering Method
yang ji long ; chen zuo ; yang wei kang ; zhang qiong wen
..............page:35-36
Choose and Application of Software Development Model
zhou hao hui
..............page:7-8