Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2003 Issue 11
Simulating Digital Circuit by Programming with Flash
han xiao dong
..............page:91-93
Application of Custom Page Template in ASP.NET
huang jun ; chen tie ying
..............page:94-96
Application of VLAN in Enterprise Management
chen yu ming
..............page:97-98,101
Application of Winsock of VB in Sending E-mail
du li nong ; chai chun xiang
..............page:99-101
Applying Excel Tools in Economic Programming and Managing Decision
yang zhi xiang
..............page:102-104,106
Wavelet Transform and Its Application in Data Compression
zhang hai peng ; zhao jing bo ; yang zhan lu
..............page:105-106
Design and Analysis of SET-based Network Payment System
yin mei juan ; wang zhong shang ; li mei lin
..............page:62-64
Research on Database Security and Encryption Technology
hu zhi qi
..............page:58-61
Monitoring and Scheduling System of Transportation Vehicles
xiao yun ; deng yong bo ; xu jie min
..............page:56-57
Wireless Application Development Based on J2ME Architecture
zhuang yi ; li hao hong
..............page:53-55
Several Ways of Implementing Chatroom by JSP Programming
wang hai kun ; zuo fei
..............page:51-52,55
Interaction and Its Application of VRML and Java
xu hong zhen ; zhou shu min ; tang bin
..............page:48-50
Comparison of ADO Components of C++ Builder and Application in the Physiological Recording System
li xin gang ; zhu hong tao ; xiong rui wen ; sun hui
..............page:42-44
Design and Implementation of an Engineering Corps-equipped Store Management System Based on Workflow
qiu jian xiong ; zou gang ; ao yong hong ; yan jin ; wu li
..............page:36-38
Design of Customer Relationship Management System
wu wei ; tang dian long
..............page:30-32
ERP Management with Information in Medium & Small Enterprises
pan ai hua ; du hong mei ; shen han you ; mai yun fei
..............page:26-29,32
A Fuzzy Clustering Approach in Data Mining
wan hong xin ; nie cheng qi ; yin hong
..............page:1-3,25
Research and Improvement on Isolated-word Recognition with DTW-based
wan chun ; huang jie sheng ; cao zuo zuo
..............page:4-6
A Fast Algorithm Used in Modern Network Search Engines for Matching String Patterns
wu zuo ; zhu huai hong ; xia li chun
..............page:7-8,11
Digital Image Watermark Based on Wavelet Switch
wei xiu ran ; wang feng
..............page:9-11
Recovery of Digital Image
fu zuo ; xiong li xia ; zhang xiao feng
..............page:12-13
Method of Writing Technical Document of Software
yin hong ; fu qing ping
..............page:14-15,23
Key Management for IP Multicast
huang dong jiu ; wu hong zhang
..............page:16-17,20
Kernel Escalating of Linux Operating System
jin wei min
..............page:18-20
Method of Detecting Operating System
lin tian feng
..............page:21-23
Realization of Virtual Host Based on Windows 2000
yang zhi yong ; yang yu xian ; xiao yun
..............page:24-25
Solution of Multiple Computer Classroom Management Based on School Network
wang jian xiong ; lan hong
..............page:109-110
Research on Building up University's Network Laboratory
pan zi qiang ; jiao zhong ming
..............page:86-87,90
Technique of "TOP-N" Data Query in MIS
jiang li
..............page:84-85
Establishing Application Programs Based on ASP,VB.NET and XML
he wu ji ; he yue shun
..............page:79-81
Research on Building WebMail System with High Performance and High Scalability Based on Java Platform
wu shao xing ; liu li ming ; zhao xue ; wang yu lei
..............page:77-78,81
Achieving the Security of WLANs Using Kerberos
wei jie ; li zuo
..............page:74-76
Implementing IDS in Novell
wang xing
..............page:71-73,76
How to Use Security Characteristics of IIS 5 in Web Application
huang hua ; cai zuo ; han xu
..............page:68-70
Design and Realization of Stock Network Security Management System
wan chang lin ; zeng zuo ; zhan chuan jie ; xiong hong ; wan fu chun
..............page:65-67,70
A Method of Transforming .txt File to Database File
wang sheng he
..............page:82-83