Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer and Modernization
1006-2475
2003 Issue 5
Application of Network Security Technologies in Insurance
peng jun ; dou lu biao ; mao ling mei
..............
page:92-94
Automatic Repeat Pronunciation by PowerWord with Windows Messages
zhang cheng
..............
page:89-91
Application of OLE Automation Technology in MIS
wang chang jian ; xiao gang ; dan ji hong ; cheng zhen bo ; zhang yuan ming
..............
page:86-88
A Design Mode of Production Management and Information Integrated System in Refinery
wu ling yun ; tong yi cai
..............
page:83-85
Methods of Backing up SQL Server Database with Delphi
sun yong
..............
page:80-82
Implementation of Serial Communication in Delphi
zeng ming ru ; zuo jian guang ; rao hui sheng
..............
page:78-79,82
The Realization of Data File I/O in Matlab
jian qing hua ; zhong hua lan
..............
page:75-77
Application of Fuzzy Control in Household Electric Appliances
hu zheng
..............
page:73-74,77
The Application of the Personnel Management Pattern in the PDM Implementation
xie shi kun ; tu hai ning ; xia fang chen ; liu jian sheng
..............
page:70-72
A Solution of Mobile Operation System Based on Client-side
wang le peng ; huang li ping
..............
page:67-69,72
The Defending Strategy to Trojan Horse
lu yuan ; cheng bo cai
..............
page:64-66
Data Transmitting Encryption in Oracle Network
xiao qing lei
..............
page:62-63,66
An IDS Model Based on Data Mining
zhang rui xia ; wang yong
..............
page:58-61
Study and Comparison of the Web-Mail Security Technologies
zuo jing bo ; yang yue xiang ; zuo guo ping
..............
page:53-57
Security Framework in a Dynamic Information Publishing System
cao qing
..............
page:49-52
Robust Point Corresponding Concave Surface Minimization
zhong zhi quan ; yin hua
..............
page:4-6,11
Symbolic Interpretation of Artificial Neural Networks
jiang liang xiao ; cai zhi hua
..............
page:1-3
Research of a New Line Algorithm
yang bo
..............
page:45-48
A High-order Image Subsampling Method Using Orthogonal Least-squares-based FANN
wu chuan sun ; zhou ding kang ; xing rui
..............
page:43-44,48
Methods of Greyness Revision on Digital Image
guan li
..............
page:40-42
Face Recognition Based on Principal Component Analysis in the Complex Space
gao xiu mei ; gan zuo ; yang jian
..............
page:37-39
Realization of RADIUS Based on Sun Server
cao yi qin
..............
page:35-36,48
The Windows 2000 Terminal Technology and Linked Network
deng yong bo ; xiao yun
..............
page:33-34
Design of Network Communication Program for Windows Based on Visual C++
jiang nian de ; fang zhi guo
..............
page:30-32,61
Requirement Elicitation Based on Use Case Modeling
li xin ; jia dong
..............
page:27-29
Architecture-based Software Process Research
lin ping ; chen zhong yu
..............
page:24-26
A New Method on Data Reduction
mu zhen dong ; zou zuo gang ; jiang shun liang
..............
page:21-23
Implementation of Attacking Vigenère Ciphertext Based on Java Applet
zhang jian hui ; wang dian hong ; yan zuo ; zeng de fan
..............
page:17-20
Computer Simulation Analysis of Chaotic Attractor Property
yu guo an ; huang sheng wei ; fang wei feng
..............
page:14-16
Ray-tracing Study in Terms of β-spline Patches
gu chun sheng ; cai yong
..............
page:12-13
Research of Component Reuse in Open CNC System
li ling ; li bin
..............
page:7-11