Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Development & Applications
1003-5850
2007 Issue 8
visual basic diao yong visual c + + dll de fang fa
liu shu lun ; li xiao jing
..............
page:77-78
ji yu yuan dai ma de next nextval han shu zhi qiu jie fang fa
liu hua feng
..............
page:78
java+oracle shi xian fen ye gong neng
wang er nuan ; kang li
..............
page:76
vfp6.0 zhong yi xing chuang kou de zhi zuo
chang zuo zuo
..............
page:75-76
shu ju an quan ji shu zhong innodb de ying yong
zhou li hua
..............
page:74
routing xie yi tan suo
sun wei xi
..............
page:73
The Application of MatrixVB to Data Analysis for Tank Firing Experiment
han chao ; wang jian bin ; liang xiao gang
..............
page:70-72
Calibration Method and Error Analysis for Belt Conveyor Scale of Steam Power Plant
Zhang Xiaomin
..............
page:68-69,72
The Way to Obtain the Node-Path of Multilevel Catalog
xia ming wei ; liu xing sha
..............
page:66-67
Researching and Applcation of the Disaster-Tolerant Techniques to the Urban Mass Transit
xia ke fen ; li yu xuan
..............
page:63-65
Research And Implementation in E-Government Affairs based on B/S Structure
Zhu Benhao
..............
page:60-62
Gird Technique and its Application to Remote Teaching
Yang Yang
..............
page:57-59
Study and Implementation on High-voting Exceptional Pattern Mining
guo yan ping ; xin bo yu
..............
page:55-56,62
Analysis of U-Boot startup and Porting to S3C2410
dong chen ; gao jin shan ; chen qing wei ; wang ya ting
..............
page:53-54
The Application of Rational Unified Process Rational to Web Design
zuo jian li ; liu song tao
..............
page:50-52
Typical Errors Analyses and Countermeasures in Mathematics Experiment based on MATLAB
li xiao ping ; liu jin shan
..............
page:13-15
Design of Portable Inspecting Aparatus of Environment Parameter based on USB HOST
zhang su wen ; jin luan
..............
page:2-5
Clustering Algorithm for Intrusion Detection
wu yan ; peng xin guang
..............
page:6-7,10
Design and Implementation of Video Multicast System Under IPv6
chen kai wen ; liu li qiang ; zhang zuo
..............
page:8-10
The Local Area Network Winds Service and Supervisory System Development
Liu Sanman
..............
page:11-12,15
fen bu shi gao ke yong ic ka xi tong de she ji yu shi xian
peng hai yun ; chen zhan wei
..............
page:79-80
authorware zhong han shu bian liang zhi shi dui xiang mian ban hui fu fang fa
chen zheng dong
..............
page:80
The Data and Processing Sgstem based on Labwindows/CVI Collecting
li xue ; liu tai kang ; jiang yun
..............
page:47-49
The Pivotal Technology about Implementation of Content Management System
Zhang Men
..............
page:44-46,49
The System Description and Data-stream Analysis of Bridge Expanded-Joist
zhang hui ling ; yong yao wei ; ao gu chang ; he hai sheng
..............
page:41-43
The Application of Bayesian Network to the Ground Evaluation and Analysis of Town God
zhang yin li ; hou li chu ; zou gang
..............
page:29-31
ISODATA Algorithm and Applications in Computer-Aided Diagnosis
Lü Xiaoyan
..............
page:26-28
The Realization of PAM Attestation of SIP Server Using LDAP
Li Wenqin
..............
page:16-18
The Design and Implementation of SOHO Optical Router
zhang xiao xia ; xiong chuan ping
..............
page:39-40
The Discussion of Distributed Computing Technology
Li Hongyu
..............
page:36-38
Application of the VMware Virtual Machine Technique to the Computer Practical Teaching
liang cheng ; li qiong ; xia jian bo
..............
page:34-35
Node Localization Algorithm for Wireless Sensor Network
li xiao ding ; feng xiu fang ; zhao zuo zuo
..............
page:32-34,38
A Sort of Realization of RSA Algorithm and its Application to Conditional Access System
Bai Jing
..............
page:24-25,31
The Algorithm of Detectors Generating in Intrusion Detection System based on Artificial Immune Theory
xiao yan feng ; li dong sheng ; zhang li ; zhang zheng dong ; liu jiang ping
..............
page:22-23,28
Workflow Technology and its Application to Military Training Management System
zhao jian kang ; xiong qing ping
..............
page:19-21