Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Development & Applications
1003-5850
2007 Issue 2
qiao yong swishmax zhi zuo duo mei ti dong hua ke jian
yin yong tian ; su qing xiang
..............page:封二
delphi zhong shu ju ku yu excel shu ju jiao hu ji shu
chen jian hua
..............page:64
xml wen dang jie xi ji shu fen xi
jia su lai
..............page:63
Analysis of HSRP Protocol and its Application
wang qing sheng ; hu tao ; gao feng
..............page:45-46,49
Realization of A Data Integration System based on XML
wang xiu juan ; zhang yong mei
..............page:43-44
Application of Data Mining in the Quality Evaluation System for Classroom Teaching in University
zhang zhen ; hu xue gang ; zhang ya ping
..............page:41-42
A Design Scheme of SIP Server of IP Telephone
xu mao lin ; huang ben xiong ; li zuo
..............page:58-60
Application of IUC Structure in Agriculture Expert System
fan zhuo hua ; li ru ; mei rui ; zhang hu
..............page:55-57
Application of TCP/IP Congestion Control Method in Linux Operating System
song wen guang ; zuo chun xue ; lu shu tian
..............page:53-54,57
Design of PDA based on TI OMAP
han jin yan ; lu su feng ; wang sheng kun
..............page:47-49
Observer Pattern in Visual Basic
Liu Nan
..............page:38-40
Realization of Communication of Fire Machine and Fire Transceiver by Using MSComm Controlware
wu zi rong ; liu lin zuo ; chen xuan
..............page:36-37
Windows GDI+ Application in Geometry Shape Measurement
xu zuo zuo ; ge qing ping ; cui wu zi
..............page:34-35
Long-distance Online Monitor System of Java-based B/S Structure
bai yu ; ma xiao jiang
..............page:31-33
Design of Embedded Network Interface based on NIOS Ⅱ
kang wen xuan ; li bin ; qu wei ; bao guang xi
..............page:27-28
An Algorithm of Vehicle Logo Location from Coarseness to Fine
chen yang ; li ding zhu
..............page:22-23,26
Research and Implementation of Insurance Software based on J2EE
liu fei fei ; zuo hong yin
..............page:20-21
Research on Image Encryption Method based on Two Chaotic Sequences
zuo jing ; li dong sheng ; hou xiao fang
..............page:17-19
Research and Implementation of Topic-Specific Concept Mining
hu ; su xue feng
..............page:14-16
Research and Realization of VLAN Technology
hong jun ; han zuo
..............page:11-13
Research on Technology and Security of IEEE802.11 WLAN
wang ling ; lv wei
..............page:9-10
Research on the Silicon PIN Diode Detecting System
zhang yan ; zeng guang yu ; hong zhi gang
..............page:7-8
Protective Technique Research on Detecting Operating System
chen jia dong ; zhu jian jun
..............page:4-6