Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Development & Applications
1003-5850
2007 Issue 4
hui ji dian suan hua de chang yu duan
lu chuan qiang
..............page:78
wen ben wen jian li mei you jie shu biao zhi
chen shu zhen
..............page:79
zai after effects zhong fang zhen san wei pai she
zhu xiao lin ; zhou rui
..............page:80
shu ju wa jue zai jiao xue ping jia zhong de ying yong
yang jin fan
..............page:77,79
ye tan authorware zhong bei jing yin le de kong zhi
wei xiao yan ; luo jin hua
..............page:76
Research of Wireless Network Security
Qiu Mangxian
..............page:43-44,47
Study on Airplane Anticollision Intelligence Decision-making in Combat Simulation
liu xiao wei ; tian wei ping ; tian chuan
..............page:10-11,64
Network Intrusion Detection Technique based on State Protocol Analysis
wang qing sheng ; zhang xiu rong
..............page:55-57
Design of Development Model of Teaching System based on Web Services
yang xing ; luo chen zuo
..............page:27-29
Research on XML Access and Store Technology based on Oracle XML DB
li xiao bo ; tan zuo ; zeng jian chao
..............page:68-70
Application of Decision Tree Mining on CRM
Zhang Xinxiang
..............page:52-54
Application of Data Mining in Cosmetics Beauty Center
hu zhong dong ; zhang jie
..............page:40-42
Research and Realization of Basic Image Geography Data Management System
qin kai ; ma juan ; yang jie
..............page:33-35
Implementation of 3D Digital Map based on the Non-standard Navigation Photograph
zhang meng zi ; shi guo chuan
..............page:7-9
Design and Implementation of an Authentication Scheme
li ming jie ; chang jin yi
..............page:19-21
Application of Differential GPS Positioning Technology in the Remote Telemetry
song wen guang ; zuo chun xue ; lu shu tian
..............page:71-73
Research on WEB Information Extraction Technology based on HTTP 1.1 Protocol
chen xiao su ; deng shuo ; xiong bing
..............page:48-49,67
Rfid Tag Reading Module with Privacy Information Protection
Huang Jianping
..............page:38-39,42
Research on Collaborative Logistics Commerce System
chen jian chao ; chen qi ming ; xiong zuo
..............page:36-37,70
Application of Independent Component Analysis Technology in Speech Signal Processing
qiao yong feng ; ma jian fen
..............page:22-23
Emergency IDSS for Hubei Province
zhang kai ; li ming qiang ; jiang fan
..............page:17-18,21
Analysis and Research of Multi-level Trust Models in PKI
li jiang ; ren xin hua
..............page:58-60
A Shooting Algorithm for Soccer Robot based on Cosine Curve
li feng ; liu zuo shi ; lin gui juan
..............page:50-51
Design and Implementation of Tank Agent in Combat Simulation
zhao shi ; zhao yan hui
..............page:45-47