Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Development & Applications
1003-5850
2007 Issue 1
guan lian gui ze wa jue zai wang luo jiao xue ping jia zhong de ying yong
sun li ; chen ping ; chen hua li
..............
page:封二
zhong xiao xing ruan jian xiang mu guan li liu ge guan jian dian
wang shu rong ; zhao jin song
..............
page:64
ji yu asp zai xian kao shi xi tong zhong shi xian dian zi zheng shu gong neng de fang fa
zhang le cheng ; shao mei ; shi fei
..............
page:62-63
b/s mo shi ying yong zhong ye mian shua xin wen ti yu jie jue fang an
cha wei zhong
..............
page:60-61
ji yu gina he zhi wen shi bie zeng qiang windows nt deng lu an quan
wang zuo ; zou xiao
..............
page:59,63
mysql de jdbc bian cheng shi li
zheng yan zuo
..............
page:58,63
Collective Fund Management Network Architecture and Its Security Scheme
Zhang Jintao
..............
page:56-57
Design and Implementation of Yarn Management System for the Knitting Dress Enterprises
suo jian ; qiu zhi cheng
..............
page:34-36
Application of DirectShow Technique in Advertisements Monitor and Management System
geng ming ; yuan zuo min
..............
page:32-33,55
Realization of Interactive Control of Virtual Coal Mine Accident Rescues Training System with Combination of Java and VRML
xie hong zuo ; yu xiao xia ; li san yan ; yu xue li ; zhou chang neng ; li rui xia
..............
page:44-46
Touch-screen and its Control in the Embedded System
wen jing yang ; yu tong ; fu meng yin ; tao ran ; zhang quan hai
..............
page:39-41
Application of Mobile Agent in Wireless Sensor Networks
zhang hai yu ; feng xiu fang
..............
page:53-55
Analysis of Customer Marketing Results based on Data Mining
liu shao qing ; huang zhang shu ; huang jian hui
..............
page:4-6
Creating Graphical User Interface with MATLAB
wang xiao xia ; yang feng bao ; yuan hua
..............
page:37-38
Software System in Desiging Fiber Communication Relay Distance based on VC++
zhou feng ; zhang xiao feng ; long mei
..............
page:42-43,61
Solving Combinatorial Ambiguities in Chinese Word Segmentation Using Contextual Information
feng su qin ; chen hui ming
..............
page:23-25
Converting HEX File to EXCEL File Using VB
tang zuo ; sun ru tian
..............
page:7-8
A Model of Intrusion Response based on Petri Net Workflow and J2EE Framework
zhang shun li ; li dong sheng ; li jian wei ; liu xiu lian
..............
page:49-52
An Intrusion Detection Model based on Protocol Analysis and Immunological Principle
li xiao ru ; sun min
..............
page:21-22,25
An Improved Distributed Intrusion Detection System base on Agent
han jing ling ; sun min
..............
page:19-20,28
Advantage of Multimedia in English Autonomic Learning
Fang Jinxia
..............
page:16-18
Design of High Performance Timer Queue for Grid Computing
yang han xiang ; yuan xin zuo
..............
page:29-31
Study on Network Telephone based on USB HID Protocol
qi zhi wen ; jiang shao sheng
..............
page:26-28
Embedded Network Video Server based on DM270
yang hui zhen ; cheng yong qiang
..............
page:9-12
Study on Ontology-based Semantic Web Services Communication Protocol
geng li li ; yu xue li
..............
page:2-3,6
The Function of Data Mining in Logistics Management
Cao Min
..............
page:47-48,52
Mining Result Presentation in Focus + Context Style
liu fa sheng ; yang hui
..............
page:13-15