Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Knowledge and Technology
1009-3044
2005 Issue 1
kong jian shu ju wa jue li lun ji fang fa de tan tao
cheng hua
..............
page:3-4
wang luo ke cheng de dao hang xi tong she ji
chen zuo pin
..............
page:93-94
qian xi gao xiao xiao yuan wang de she ji yu gui hua
li ye qin
..............
page:95-96
li yong shu ju wa jue de guan lian gui ze fang fa lai jie jue wang luo yong sai de wen ti
wen yun
..............
page:89-92
zhong jian jian zai dian zi shang wu zhong de ying yong
liu shao kai
..............
page:87-89
yi xiang gou fang logistic hui gui fen xi
lu an sheng ; chen yong qiang ; tu hao wen
..............
page:84-86
ying pan chang jian gu zhang fen xi yu wei hu ji qiao
zhao xian jin
..............
page:82-83
ji yu yi dong shou chi she bei de shi shi shu ju cai ji ji yi dong da jia ji shu de yan jiu
fan wen yue ; zhang hui
..............
page:78-81
XML-based Network Management
wang hai qun
..............
page:75-77
xiang mu kai fa guo cheng zhong de li cheng bei guan li xi tong de she ji
gao rui xin
..............
page:72-74
tan windows server 2003 xi tong xiang dui yu windows server 2000 xi tong de ti gao he gai jin
chen hong jun ; tian ying
..............
page:70-71
qian ru shi xi tong de fa zhan xian zhuang he fa zhan qu shi
li yong
..............
page:68-69
Analysis of security of local area network(LAN)
ren ji xiang
..............
page:24-27
"vfp yu excel jiao hu bian cheng " de tan tao
fan qing guang
..............
page:21-23
Net Intelligent Answering System Based On ASP and Access 2000
cui peng ; ji gen yun ; zheng wei
..............
page:18-20
delphi zhong cai yong xml shi xian shu ju jiao huan
liu de wen
..............
page:16-17
The Hibernate Persistence Solution for Material Transaction System Based on J2EE
shen rui
..............
page:13-15
ji yu corba he jconnect de fen bu shi dui xiang mo xing de shi xian ji shu
qian yi bo ; wang yong
..............
page:5-9
linux+apache+php huan jing xia shi xian zip rar wen jian jie ya suo
zhu ai bing
..............
page:9-12
The Application of Bluetooth technology to The Ticket-selling System
ren zhi xuan
..............
page:65-67
lan ka shi yong zhong de chang jian wen ti he shi yong ji qiao
xia yu hong
..............
page:63-64
ji chang shi shi jian kong xi tong de she ji yu shi xian
ren guang long
..............
page:61-62,86
fen bu shi xi tong ti xi jie gou de yan jiu
qiao jian hui
..............
page:58-60
A Method of Developing the Network Application Based-on .NET Circumstances
yu jin chang
..............
page:55-58
Protein Secondary Structure Prediction With HSMMs
liang gang feng ; xie tao
..............
page:52-54
di shui xi tong zhong de wang luo jia gou she ji ji ying yong
yao wei
..............
page:50-52
fen bu shi dui xiang chu li ji shu
sun ya
..............
page:47-49
the Method on How to Prevent Software Piracy and Resist Faking in Keys
shao li ping ; zhong wen tao
..............
page:44-46
yi zhong ji yu agent ji shu de web mining mo xing
yuan yi ; chen li zhou
..............
page:41-43
"san wang " kuang jia xia dian zi zheng wu de wang luo de an quan xing tan tao
xu ying ; liu jian yu
..............
page:38-40
Application in enterprises of Network Isolation
zhang guo xu ; zhang ya jing ; wang yong qiang
..............
page:36-38
zi wang yan ma suan fa jie xi
tang feng
..............
page:34-35
A Solution to the Information Security of Online Game
xu yong liang
..............
page:31-33
shi yong lu you qi fang yu ru chong bing du
su dan
..............
page:28-31