Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Programming Skills & Maintenance
1006-4052
2014 Issue 8
xin xi dong tai
..............page:3,156
The Coupling of Eddy Covariance and LUE Model
CAI Jia-feng;,HU Jun-guo;
..............page:7-9
Research and Application of K-means Clustering Algorithm
WANG Dong;,XIONG Zhi-bin;,ZHU Jian-feng;
..............page:10-12
Analysis of the Segment Tree and its Basic Operation
HU Wei-dong;
..............page:13,17
Analysis of DEDECMS Document Structure
JIANG Fan;
..............page:14-15
Design and Development of Campus Online Trading Platform Based on ASP.NET
CHEN Xiao-xu;,SHI Hui-yu;
..............page:18-19,42
The Design and Implementation of UI for Airport Comprehensive Monitoring and Guidance System
JIANG Wei-an;,WANG Yun-lei;,ZHAO Ting-yu;
..............page:20-23
Design and Implementation of NCRE Online Registration System
YANG Yun-chun;,ZHANG Da-wei;
..............page:28-30
Word Documents Programming Based on Word Object Module
CHEN Jian-li;
..............page:31-32,38
Software Development of Data Communication with C/S Model Based on PB
QI Ge-qi;,WEN Bo-ying;,ZHU Hui;
..............page:33-34,48
Using Open Source Software to Build High Available Business System
HE Zhifeng;,LIANG Ning;,LU Yingjie;,LUO Yuxia;,WU Tiedi;
..............page:39-40
Research on Application of the Age of Big Data
YANG Yong-qiang;
..............page:49-50
The Research and Implementation of Data Processing Function in DedeCMS System
BAI Qing;,LU Meng;,LV Jian-guo;,MU Xin-long;,XIE Yan-gao;
..............page:54-55
The Consumables Database Access Method Based on LINQ
BAI Peng-gao;
..............page:60-62
A Method to Realize the Compression and Repair Access Database Files Through Delphi
LI Xia;,TANG Yuan;,WU Yanyan;
..............page:63-64
The Processing Technique on Special Data Entry of Visual FoxPro 9.0
HOU Chun-ying;
..............page:65-66,69
Excel Application in Batch Rename Files
LI Shang-wei;
..............page:67-69
Oracle Bind Variables Peek Feature In-depth Analysis
HOU Wan-ying;
..............page:72,83
Talking about the Internet of Things and it's Trend
YU Li-li;
..............page:73-74
Research Webpage Design Examples Based on CSS Technology
ZHEN Feng-qi;
..............page:75-76
Design of Mamagement System Based on Counting Model Campus Network
CHEN Yi;,HU Ping-ping;,JIANG Hua;
..............page:80-81
Application of Adobe Presenter 7 in Network Courseware
DING Sui-juan;,LU Chun-yu;,XIE Fan;
..............page:82-83
Achieve Radio Frequency Planning Based on Depth First Search
TAN Xue-qin;,YAO Jia;
..............page:84-85,92
Weather Radar Professional Work SMS Warning's Two Implementation Methods
JIANG Long;,KANG Dao-jun;,ZHEN Ting-zhong;
..............page:86-87,96
Mining Processing of Web Log Mining and Web Structure Mining
FU Shuai;,LIU Li-na;
..............page:88-89
Ajax Cross-domain Access Web Services
ZHOU Xiao-li;
..............page:93-96
Research of a Virtual Recovery Pass-through Method
SHEN Rong;
..............page:97-99
The Wireless Monitoring and Positioning System for Smart Car
JIANG Yong-xin;,LI Jin-yi;,LIU Huai-yuan;,ZHAO Chun-liang;
..............page:102-103,118
The Design of Password Keyboard Based on Infrared Indentification
DONG Hai-bo;,SONG Guang-jian;,YU Zhong-hua;
..............page:104-105
VISIO Aided Drawing Intercommunication Diagram of Fiber Communication Equipment
BAO Wei-dong;,ZENG Zhao-wen;
..............page:108-109,116
Using DDS in Modeling and Simulation Systems
WU Wei-yuan;
..............page:110-111,116
Research and Prevention Based on U Disk Virus
WANG Jing-qi;
..............page:117-118
Essay Talk on Solve the Problem of the Common Network Breakdown
WU Wei-hua;,ZI Lei;
..............page:119-120
To Explore the Strategy of Computer Network Security
XU Qing-lin;
..............page:123-124
Public Transport Travel Requirement Mining and Route Optimization Based on Bus Forum
GUO Ning-ning;,LI Chao;,LIANG Ye;,XING Chun-xiao;,XU Rui-yun;
..............page:125-127
Design of Active Safety Warning System Based on Vehicle Positioning Terminal
LI Ran;,LV Ting-ting;,SHI Wei;,ZHANG Hao;
..............page:128-129,132
Network Security Evaluation Model Based on Multi Information Fusion
LI Qin;,LI Yun-jie;,YANG Jin;
..............page:130-132
Study on the Application of Class to Class Based on Cloud Computing in Education
LI Li;,LIU Ting;,MENG Qing-wei;
..............page:137-138,150
Extensive Study of Computer Application Technology
LI Lun;
..............page:139-140
Application of Case-Study Teaching with Recursive Case
CHENG Ji-hong;,LOU Shan-you;
..............page:153-155