Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Study
1002-2422
2007 Issue 5
Analysis of the Elliptic Curve Cryptosystem and Its Security
Bai Yongxiang
..............
page:53-54
Using VB to Simulate Clustering Recommendation Algorithm on Web Page
Song Xiuqin;Sun Xinyan;Zhao Limin
..............
page:54-56
Brief Discussion of Establishing Management Information System Inside Manufacturing Industry
Xie Zhongmei;Li Lin;Zeng Xiaoliang
..............
page:57-58
Program in C Language in View of the Problem of Hundred Money Hundred Fowls
Liu Jinxiang;Xia Taiwu
..............
page:59-60
Secure Backup of Database
Sun Qiaoyu;Sun Qiaoyan
..............
page:60-61
An Instance of Sequential Search
Dong Lishun
..............
page:51-52
Installation and Maintenance of 《Pro/Engineer2004 WildFireV2.0》 Software
Liu Yuzhen
..............
page:50-51
Tips on Picture-printing from AutoCAD
Zhang Hongdu
..............
page:49-50
Teach You to Use Data Mining Tool-Weka
Wang Xuehui;Wang Xingpeng
..............
page:48-48
Computer Room Management System of Wireless Power Conrol Based on Single-Chip Computer
Wang Peng
..............
page:46-47
Design and Application of Automatic Process System of Physical Experiment Data
Shi Xinlei
..............
page:44-45
Making the Courseware of "English Sounded Small Dictionary"
Wang Huiying
..............
page:43-44
Research and Realization of Applying Stream Medium Implanting Technology in Network Courseware
Liu Wen;Yang Deqin
..............
page:41-42
Examples of "VB Programming Design" Course in Radio and Television University Based on Task-driven Teaching Method
Fang Rong
..............
page:40-41
The Methods Improving Students Programming Intersests in VB Teaching
Wang Yange
..............
page:38-39
Realizing Fast Accessing of Product Demonstration Website by Using Thumbnail Image Technology
Zhu Manfeng
..............
page:23-25
Using and Maintenance for Office Computer under the Network Environment
Huang Haiting
..............
page:21-22
Design and Realization of Web Database Website Information System
Meng Yan
..............
page:20-21
Technological Realization to Improve Transfer Safety of Internet Information
Qu Jubao
..............
page:18-19
The Application of XML Technology in HIS System
Peng Shouzhen;Wan Zhongbao
..............
page:17,28
Control System Design of Automatic Bagging and Palletizing Line Based on PLC
Jiang Jihong;Lu Zhizhen;Yue Manlin;Gao Anbang
..............
page:15-17
Analysis of Technology about Google's PageRank
Wang Yuzhen
..............
page:13-15
Using VC++ and ADO Programming Database System
Tang Hong
..............
page:62-63
Porting of μC/GUI on S3C44B0X
Li Yan;Sun Yongqian
..............
page:64-封3
zheng gao qi shi
..............
page:封4
DNA Computing: Principle、 Current Situation and Its Future
Fang Cheng
..............
page:2-3
Research on Trojan Horse Concealing
Meng Lei
..............
page:4-5
Analysis of Search Engine Technology Based on "Network Spider Principle"
Jin Yi
..............
page:6-7
Using ArcIMS to Develop GIS Issue System on Internet
Tang Yi
..............
page:7-8
Design of Measurement and Controller System for Pumping Machine Based on VB
Jiang Mingming
..............
page:9-10
Design and Implementation of Paper Management System Based on .NET
Yan Guoli;Zhou Qingyi;Wu Xi
..............
page:10-11,47
Compatibility Between IE6 and JVM
Wen Jie
..............
page:12-13
Displaying and Controlling Flash Movie in PowerPoint2007 with ActiveX
Zhao Xiuhua;Zhang Xiaowei
..............
page:37-38
Research on VFP Programming Language Test Question type Using Authorware6.0
Piao Xiangzhen
..............
page:34-36
Using Web2.0 to Training the University Students' E-learning Ability
Long Xiaojun;Zhou Shenli;Feng Lili
..............
page:33-34
A Simple Way to Span A TV-Server in LAN
Lian Zhijian
..............
page:31-32
SIP Model Design Based on P2P
Wang Jihui
..............
page:29-31
The Method of Searching Disconnection of Webpages
Mao Jianhua
..............
page:27-28
Research on Using Personal Computer and Its Network Security
Bao Guangchang
..............
page:25-26