Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2003 Issue 5
Application of Network Security Technologies in Insurance
peng jun ; dou lu biao ; mao ling mei
..............page:92-94
Application of OLE Automation Technology in MIS
wang chang jian ; xiao gang ; dan ji hong ; cheng zhen bo ; zhang yuan ming
..............page:86-88
Methods of Backing up SQL Server Database with Delphi
sun yong
..............page:80-82
Implementation of Serial Communication in Delphi
zeng ming ru ; zuo jian guang ; rao hui sheng
..............page:78-79,82
The Realization of Data File I/O in Matlab
jian qing hua ; zhong hua lan
..............page:75-77
The Application of the Personnel Management Pattern in the PDM Implementation
xie shi kun ; tu hai ning ; xia fang chen ; liu jian sheng
..............page:70-72
A Solution of Mobile Operation System Based on Client-side
wang le peng ; huang li ping
..............page:67-69,72
The Defending Strategy to Trojan Horse
lu yuan ; cheng bo cai
..............page:64-66
Data Transmitting Encryption in Oracle Network
xiao qing lei
..............page:62-63,66
An IDS Model Based on Data Mining
zhang rui xia ; wang yong
..............page:58-61
Study and Comparison of the Web-Mail Security Technologies
zuo jing bo ; yang yue xiang ; zuo guo ping
..............page:53-57
Robust Point Corresponding Concave Surface Minimization
zhong zhi quan ; yin hua
..............page:4-6,11
Symbolic Interpretation of Artificial Neural Networks
jiang liang xiao ; cai zhi hua
..............page:1-3
Research of a New Line Algorithm
yang bo
..............page:45-48
A High-order Image Subsampling Method Using Orthogonal Least-squares-based FANN
wu chuan sun ; zhou ding kang ; xing rui
..............page:43-44,48
Methods of Greyness Revision on Digital Image
guan li
..............page:40-42
Face Recognition Based on Principal Component Analysis in the Complex Space
gao xiu mei ; gan zuo ; yang jian
..............page:37-39
Realization of RADIUS Based on Sun Server
cao yi qin
..............page:35-36,48
The Windows 2000 Terminal Technology and Linked Network
deng yong bo ; xiao yun
..............page:33-34
Design of Network Communication Program for Windows Based on Visual C++
jiang nian de ; fang zhi guo
..............page:30-32,61
Requirement Elicitation Based on Use Case Modeling
li xin ; jia dong
..............page:27-29
Architecture-based Software Process Research
lin ping ; chen zhong yu
..............page:24-26
A New Method on Data Reduction
mu zhen dong ; zou zuo gang ; jiang shun liang
..............page:21-23
Implementation of Attacking Vigenère Ciphertext Based on Java Applet
zhang jian hui ; wang dian hong ; yan zuo ; zeng de fan
..............page:17-20
Computer Simulation Analysis of Chaotic Attractor Property
yu guo an ; huang sheng wei ; fang wei feng
..............page:14-16
Ray-tracing Study in Terms of β-spline Patches
gu chun sheng ; cai yong
..............page:12-13
Research of Component Reuse in Open CNC System
li ling ; li bin
..............page:7-11