Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2005 Issue 1
wang luo ke cheng de dao hang xi tong she ji
chen zuo pin
..............page:93-94
qian xi gao xiao xiao yuan wang de she ji yu gui hua
li ye qin
..............page:95-96
zhong jian jian zai dian zi shang wu zhong de ying yong
liu shao kai
..............page:87-89
yi xiang gou fang logistic hui gui fen xi
lu an sheng ; chen yong qiang ; tu hao wen
..............page:84-86
ying pan chang jian gu zhang fen xi yu wei hu ji qiao
zhao xian jin
..............page:82-83
XML-based Network Management
wang hai qun
..............page:75-77
Analysis of security of local area network(LAN)
ren ji xiang
..............page:24-27
"vfp yu excel jiao hu bian cheng " de tan tao
fan qing guang
..............page:21-23
Net Intelligent Answering System Based On ASP and Access 2000
cui peng ; ji gen yun ; zheng wei
..............page:18-20
delphi zhong cai yong xml shi xian shu ju jiao huan
liu de wen
..............page:16-17
ji chang shi shi jian kong xi tong de she ji yu shi xian
ren guang long
..............page:61-62,86
fen bu shi xi tong ti xi jie gou de yan jiu
qiao jian hui
..............page:58-60
Protein Secondary Structure Prediction With HSMMs
liang gang feng ; xie tao
..............page:52-54
fen bu shi dui xiang chu li ji shu
sun ya
..............page:47-49
the Method on How to Prevent Software Piracy and Resist Faking in Keys
shao li ping ; zhong wen tao
..............page:44-46
yi zhong ji yu agent ji shu de web mining mo xing
yuan yi ; chen li zhou
..............page:41-43
Application in enterprises of Network Isolation
zhang guo xu ; zhang ya jing ; wang yong qiang
..............page:36-38
zi wang yan ma suan fa jie xi
tang feng
..............page:34-35
A Solution to the Information Security of Online Game
xu yong liang
..............page:31-33
shi yong lu you qi fang yu ru chong bing du
su dan
..............page:28-31