Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Study
1002-2422
2005 Issue 6
Discussion of Excel Functions Usage Method
Yang Jiuhong;Wang Xiaozeng
..............
page:60-62
Application of Excel Analysis in Statistics
Xiao Fenfen
..............
page:62-63
A kind of Image Processing Technique Based on VFP
Chen Zhongwen
..............
page:64,封三
The Solutions of Extracting A Root of Equation Through Excel XP
Lian Ruimei
..............
page:56-57
Some Excel Skills
Sun Quanshang;Zhao Xiaojing
..............
page:58-59
The Application of Array in Setting up Database Statistical Reports
Tang Maobin
..............
page:54-55
Design and Implementation of Generic Report Based on Excel and OLE Technology
Chen Yali;Chen Wenbin;Tan Tao;Jiang Xianfei
..............
page:52-53
CMOSRAM Power Supply Electric Circuit and Its Common Faults
Zhang Zhuhua
..............
page:51,封三
Some Optimized Technique about Flash Film
Liang Fang
..............
page:49-50
An Instance of Computer Cluster Technology in Windows
Li Jianzhao
..............
page:48-49
Priority Queue Based on Heap
Wang Zhaohong
..............
page:46-47
Stack Technique and Nimble Application in Programme
Zhang Lanqun
..............
page:45-46
A Method of Designing Intelligent Adjustable Light Based on Neuron C Chip
Zhi Shuya;Duan Shubin;Gao Anbang
..............
page:44,59
Multi-Parameters and Files Transported in a Form on JSP/Servlet
Li Jun;Ma Weifeng
..............
page:42-43
Squid and the Configuration of Web Cache Proxy
Guo Junjun
..............
page:40-41
Data-Exchanging between Visio Graphs and Applications based on Parsing XML
Zhou Xian;Huang Chang;Fang Xiaoying
..............
page:38-40
Connecting MySQL Database Using JDBC under Windows2000
Zhang Yuanguo
..............
page:36-37
Application of Virtual PC in Computer Laboratory
Wang Jingyun
..............
page:35-36
Classification and Disposition of the Switch
Li Pei;Meng Yongbiao
..............
page:33-34
Data Encryption Technology and Comparison among Kinds of Encryption Systems
Ma Li
..............
page:31-32
Study on Electronic Commerce Security Technique Based on SET
Yang Xingkai
..............
page:29-30
How to Realize the Display of Inquired Results in Separate Pages
Hu Yongzhi
..............
page:27-28
The Research and Implementation of A Pseudo Random Number Algorithm
Zhao Xuefeng
..............
page:25-26
Solving Assignment Problem Based on Genetic Algorithm
Wu Haijun
..............
page:23-24
The Implementation of Serial Communication
Duan Moyi
..............
page:21-23
Communication Methods between Threads in JAVA-Wait、notify and Notify All
Li Yijun
..............
page:19-20
Implementation of Object-oriented Inheritance、 Encapsulation and Multi-State in Java
Da Bin;Sun Jianyuan
..............
page:18-19
Application of Java Multithread Technique in Operation System Class
Li Feng
..............
page:16-17
Modeling and Designing of Spin Interaction in Flash
Sun Zhongtao;Xu Xiuwei
..............
page:14-15
Research with Guard Against of Peculating IP Address in LAN
Wang Daosheng
..............
page:12-13
To Guard Against the Problem of Misappropriate IP in Campus Network
Gong Yuliang
..............
page:10-11
Some Research of Dynamic Programming on Hidden Markov Models
Liu Xianghua
..............
page:2-4
Residence District Intelligentized Management System by Computer-control Technique
Wang Haoran
..............
page:4-5
Automatic Webpage Publish System Based on Delphi
Li Quanbin;Huang Chang;Zhang Honggang
..............
page:6-7
A Solution of the University Educational Administration Management System that Accesses Different Relative Database with .NET Component
Xiao Mansheng
..............
page:8-10