Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Development & Applications
1003-5850
2009 Issue 12
gao xiao de java yi chang chu li
zuo shi feng ; xiang mo jun
..............page:73
How Substituting SSH for Telnet Internetworking Equipments
liu yan huo
..............page:63-64,71
Research on Performance in Network Management based on CORBA
liu dong dong ; wang mei ; li guo li
..............page:56-59,67
Ja.net-based Solution to Achieve Synchronous Integration
yan nan ; yang zhong ; wang qiong
..............page:60-62
Application of Rule-based Outlier Data Mining to Pest and Disease Forecasting
wang hong xia ; wei yi wei ; chen jun jie ; wang zhi wei
..............page:41-43
Mode of Blog Marketing of Coal Corporation based on Web Data Mining
fan ji ; liu yi pei
..............page:44-46
A Conversion Method of Heterogeneous Databases in Grid Environment
yang qing na ; li ding zhu
..............page:50-52
Research on Data Preprocessing for Web Usage Mining
wu jiu xiong
..............page:47-49,62
Segmentation of Moving Objects based on Optical Flow
li jin hui ; shang mu yang ; xue peng xiang ; qiao yong xing
..............page:17-19
Programming of Serial Port Communication in VC++ based MSComm Control
ji xiang ; li yong quan
..............page:34-35,38
Design of Decision Support System of New Rural Construction based on Data Mining
shi yu zhen ; zhao wei ting
..............page:39-40,46
oracle11g zhong biao fen qu de xin te xing
wang er nuan
..............page:72-73
Evolutionary Computation: A Survey of the-State-of-Arts(First Part)
zhang zuo dong ; wu le nan ; zuo ji ; wang shui hua
..............page:1-5
Software Multi-Language Function Realized by VC Programming
zuo jiang fen ; li xiao zuo ; wu qiong
..............page:26-27,33
Design and Implementation of Chinese Chess Game based on Web
li wen wen ; yang gen xing
..............page:53-55
Analysis and Applications of SSL Protocol
ren hai liang ; han hui lian ; wu wei
..............page:10-11,19
The Research of Constructing Event-Flow Model based on User\'s Operation
sui ying ; yu xiu shan ; yang bao
..............page:6-9
The Designs of an Information Model based on SOA
long yi min
..............page:14-16
Research on SQL Injection Attack and Prevention Approach
liang ling
..............page:68-71
Design of an Improved Honeypot System
su chen ; sang yuan ; pan li wu
..............page:28-30