Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Study
1002-2422
2008 Issue 5
Assocaition Rules Mining Algorithm Based on Transaction Matrix
Feng He;Tao Hongcai
..............page:46-47
Fast Creating Visual Basic Code From a Selected Resource
Wang Lanfang;Zong Hui
..............page:47-48
Realization Frame of Resource Discovery in P2P Network Based on J2EE
Wang Hongfeng;Qiao Rui
..............page:49-50
Correct Programming with Recursion Technique
Sun Yixin;Xu Tao
..............page:43-44
Returning to Binary Tree from its Traversing Sequence
Huang Xia
..............page:41-42
A Method of Data Encrypted Transmission
Chen Shumin
..............page:38-39
Design of Network Chat Software based on WinSock
Zhu Wei
..............page:37,39
Teaching Method of C Programming Language
jiang Jin
..............page:34-35
Packing and Custom-playing Function in PowerPoint2003
Yu Xinmei
..............page:33-34
Application of Task-driving Teaching Method in the Teaching of VB
LI Meiman;Li Xiangqian;Yi Decheng
..............page:31-33
Experience in WuBi Input Method Teaching
LI Xiaofang
..............page:30-30
The Method of Studying C++
Huang Pinmei
..............page:29-30
Writing Network Scanner in C#
Huang Chao;Guo Xianqing
..............page:26-27
Prevention of ARP Intrusion Principle
Zhang Dan;Wang Jian;Jie Longmei
..............page:25-25
The Application and Use of Email Address
Wei Xiaoling
..............page:24-24
Design and Implementation of Car License Plate Recognition System
Du Shengkang;Mao Li
..............page:15-16
Discussion on Drivers Development under Windows XP
Zhu Jianhui;Zhao Haidong
..............page:17-18
Discussion of Subnet Mask and Subnet Division
Wang Xuefeng
..............page:18-19
Survey of Web Text Mining
Zhao Xiaojing
..............page:20-21
Global Safety Solution of Campus Network
Li Juying
..............page:21-22
The Prevention of Computer Virus
Yang Dongfeng;Yang Zhanhai
..............page:23-24
Summarization of Array Sorting in C Language
Ma Lijuan;Huang Yong
..............page:50-51
The Analysis of Modern Authentication Mechanisims
Zhu Ye;Qin Fang;Gu Jian
..............page:52-53
An Improved Algorithm of Typical Reader-writer Problem
Li Guangjun;Li Ke
..............page:53-54
Sorting File with For Each
Huang Daxi
..............page:55-56
A Grammar for the Language{Inln》=1}
Liu Song;Lan Ying
..............page:56-56
Creating Three Classes of Menu in Windows with Authorware
Piao Xiangzhen
..............page:57-58
Access and Application of Database Based on JavaBean
Tang Qingsong
..............page:58-59
The Algorithm of Conversing Text File to Excel File
Wang Wei;Hu Wangshui
..............page:60-61
One Instance of Applying VBA to Make Report Forms
Wang Guang;Tan Sanqing;Chen Yuhang
..............page:61-62
Implementation of Automating Filling Form Via Socket Program
Liu Huayu;Huang Shaolong
..............page:64-封3
zheng gao qi shi
..............page:封底
Analysis of Audio Video Coding Standard
Zhuang Huan
..............page:2-3
The Research of Security Based on RSA Cryptosystems
Li Zhimin
..............page:3-4
Guard of ARP Deceit Attack in Local Area Network
Zhang Liying
..............page:5-6
Discussion on Variant Technologies of Database Access in ADO.NET
Sun Jihong;Li Wen
..............page:6-8
Thermal Protection System Design Of Power Transformer
Qiao Rui;Wang Hongfeng
..............page:11-12
the City's Traffic Lights Multi-function Intelligent Control System
Gao Anbang;Yang Huan;Chen Ping;Ji Qin;Tan Yudi;Zheng Ling
..............page:12-13
Wearable Tele-medical Monitoring System
Chen Yu;Lin Lin
..............page:14-15