Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer & Telecommunication
1008-6609
2011 Issue 1
The Bloom Filter Algorithm Based on the Information Security of Risk Assessment
Jia Hongwei;Ge Yongliang;Chen Ming
..............page:44-45
Method of Mass Data Disaster Tolerance Implementation
Zhu Haiyun;Cai Zhaoquan
..............page:48-49,52
The Application of Computer in the Field of Medicine
Xu Fengbo;Niu Danmei
..............page:74-75,77
Windows Rootkits Stealth Technology
Zhang Ying;Wang Hongchen
..............page:46-47
isv de " yun " zhi lu
..............page:7-9
Data Pushing Based on Local Area Network
Qiu Yong
..............page:35-36
The Method of Selecting Digital Signal Processor
Wu Lei
..............page:72-73
A Special Method to Call Functions in C Language
Liu Jiqing;Huang Jinhua
..............page:40-41
amd: san he xin hui ji xu cun zai
..............page:19
Discussion on the Planning and Design of Digital Campus
Huang Jinghua
..............page:70-71
xin xi dong tai
..............page:28-29,78
A System Based on Grading-Control and Automatic-Braking Theory
Chen Nanyi;Zhuo Hongyue;Nie Shuaihua;Zhao Lei
..............page:50-52
Research on Security of Cloud Environment Database
Liu Zhao;Xue Kai;Yang Shuguo
..............page:32-34
Some Experience on Higher Vocational Education of Multimedia
Liu Bingjie;Huang Kan
..............page:76-77
apprenda: rang saas tuo shou ke de
..............page:1-4
The Research on Mixing Programming with Assembly Language and C Language
Bao Jinghai;Wei Meilan
..............page:30-31,39
A Quick Sort Algorithm in Multi-Core Computing Environment
You Zuoyong;Luo Shengxian
..............page:60-62