Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Development & Applications
1003-5850
2008 Issue 9
jie jue oracle zi fu ji zhuan hua de fang fa ji shu
zhao gui ju
..............page:80
qiao yong photoshop diao ke mu ban hua
zheng yan li ; wang qing fu
..............page:79
jsp duo tiao jian fen ye cha xun de shi xian
pei sheng lei
..............page:77-78
ji yu shu ju wa jue de dian wang gu zhang zhen duan yan jiu
yuan wen jie ; wu yun ; meng ji
..............page:76,79
xml an quan ji shu ji qi wen dang jia mi shi xian
feng bo
..............page:75,78
vc++ zai yi xie te li cheng xu zhong de xiao ying yong
zheng yao ; tian min
..............page:74
Analysis of Firewall Vulnerability and Its Countermeasure
Liu Sanman
..............page:71-73
Research on Security of Ajax Application Program
Yang Zhendong
..............page:55-57
Research on Security Mechanism of IP Layer
Chen Guangshan
..............page:52-54
Design and Implementation of Digital Media Adapter System based on UPnP AV
fu dong lai ; li xuan yong
..............page:64-66
Research on Web Page Design based on DIV+CSS
zheng jun sheng ; jiang min
..............page:60-63
Application Program Development of Drawing Bezier Curve
gu lan zhi ; fang yi xiang ; jin jiang yan ; zheng jin zuo
..............page:34-35
Analysis and Design of A Web-based Network Teaching Platform
meng qing xin ; ma ling
..............page:36-37,40
Design of Linear Feature Algorithm in Map Labeling
zhu zheng guo ; liu rong qi
..............page:38-40
Special Effect of Three-dimensional Visualization Simulation based on Vega
zhang kuang zhong ; tian wei ping ; tian chuan
..............page:32-33,35
Research on Image Compound Encryption Method based on Chaos
zuo jing ; wu li wei
..............page:29-31
Color Image Sharpening and Processing based on Laplacian
wu hai bo ; liu zuo
..............page:27-28
Study on Design of Data Output System of Intelligent Water-Resistance Test Bed for Diesel Locomotives in DF Family
zuo zhong cui ; zhang bao xia ; zhang hai ming
..............page:50-51,57
Implementation of Authentication Method to USB Mass Storage Device Identity
chen hua bing ; zhang fu sheng ; zhang you jie
..............page:47-49
Application of Virtual Instrument to Radar Test
Zhang Fusong
..............page:15-16
A New Clustering Algorithm based on GPS of Ad HOC Network
geng chao yang ; zhong lian jiong ; liu xiao ying
..............page:12-14
HIDS under Virtual Machine UML
zheng fang ; peng xin guang
..............page:2-4,8