Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2004 Issue 12
Design of Data Exchange Interface Between XML and SQL Server
li zhong kai ; wei xiu ting
..............page:97-99
Realizing Multiple Manipulations of DBF Table by Constructing Special Link List
guan xue feng ; hu cheng
..............page:104-105,109
Study and Discussion of Web Log Mining Based on OLAP
du wei ; zou xian xia ; wei chang hua
..............page:106-109
Study on Speeding up Construction of PMR Quadtree
zhou qiao lin ; jiang hua
..............page:94-96,99
An Advanced Programming Method of Data Input
pan ying
..............page:88-89,93
Exploration of Recognition and Understanding of Human Behavior
liu xiang bin ; xiang jian chi ; wang sheng chun
..............page:1-5,27
Implementing Attribute Reduction by ClearMatrix Approach
zeng ji han ; ding yin hua
..............page:6-8
A Digital Image Watermarking Algorithm Based on Watermark DCT
gao zhi rong ; chen chuan bo
..............page:13-14,32
PID Parameter Adjusting with GA Based on Elite Cultivating
mo zhen xia ; liu jian bo ; zheng ting ; wang yong
..............page:15-18,35
Algorithm of Producing Combination Based on Tree Structure
zhao tian yu
..............page:19-20,38
Implementation of Drawing Bèzier Curves Interactively in General Graph Design System
tian yuan ; zhang yi lai ; peng yong kang
..............page:21-22,61
Algorithm of Reduction of Tolerant Decision Rules and Its Application
wu wen bing ; nie cheng qi
..............page:23-24,65
Brief Discussion on Middleware Technology in Database Application Systems
yao qi fu ; zhu yi zuo
..............page:33-35
Design and Implementation of Developing Report Printing Tool by Delphi
lan fang ; xu shao ping
..............page:39-41
Application of OOAD Technology in Business Modeling
liu jian hua ; wu jie ming ; zhang zheng
..............page:42-44
Design of an Improved Mail Classification System Based on Naive Bayes Algorithm
zong ping ; tian zhen sheng
..............page:48-49
Embedded System and Linux
deng dong mei ; yang tie lin
..............page:50-52
A Special Storage Structure of Tree
zhu xing hui ; lv zhen hong
..............page:53-54,87
Implementation of General Selected Fields Query in Visual FoxPro 6.0
huang liang ying
..............page:55-57,68
Research on High Performance Embedded Network Database Management System
yang han xiang ; chen jiang ying
..............page:58-61
Design and Implementation of MIS Based on B/S mode and C/S mode
xiao jie ; li jian min ; liu bin
..............page:113-115
Design of Order Workflow Management System
gan chong gang ; qiu hui zhong
..............page:116-118,121
Application of GIS/GPS+GSM in Intelligent Traffic System
li song ; wang geng sheng
..............page:122-123,127
Research on QoS Mechanisms of High Performance Routers
yi gui sheng ; huang cheng bo
..............page:78-81,84
Network Planning and Implementation of Several Districts of University
chen jiang ying ; yin hua
..............page:75-77
Project of E-commerce Data Integration in Minor Enterprise Based on XML
hu ya ping ; li guang quan
..............page:72-74
Study of Label Stack Applications in MPLS
xiao zhong jie ; shen fu ke
..............page:69-71
Design and Realization of Content-billing System Based on.NET Platform
xu da feng ; xu jing
..............page:66-68
Design and Implementation of E-government Publishing System Based on J2EE
shi yun ; lv liang shuang ; zuo peng
..............page:62-65
Design and Realization of Authority Management Model in Web Management Information System
wei zuo ; yang zuo ; zou hong ; zhan chuan jie ; zeng zuo
..............page:124-127
Implementation and Application of Role-Based Access Control
wu zhen xing ; xiong zuo ; fang yi
..............page:128-131
Research on IDS and IPS
zuo feng
..............page:132-133
Application of Government Affair Management Systems Based on Lotus Domino Security
li shu zhi ; fan cheng gong ; guo qiu liang
..............page:134-137,140
Research on Security Technique of Browser
luo yun geng
..............page:138-140
2-dimensional Barcode Technological Actuality and Prospect
xu jie min ; xiao yun
..............page:141-142
Study of Privilege Control Algorithm on Grouping in MIS for Law Execution in Police Department
li wen ; wang ming yan ; wang zuo li ; li min
..............page:143-144
How to Utilize SSL to Encrypt HTTP Communication Channel
wu hui zuo
..............page:145-147
Security Risk Analysis of SMS in GSM Network
qiu hui min ; hu chun yang
..............page:148-149,152
Analysis of Security Based on SQL and Oracle Databases
hu zuo zhi ; chen yuan
..............page:150-152
2004 nian zong mu ci
..............page:153-158