Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2005 Issue 8
Monitoring and Control System for Mechanical Equipment Based on GSM
XU Jin;WANG Xi-yang
..............page:100-102
Development of Computer Grade Exam System
YANG Bin
..............page:103-105,107
Design and Implementation of On-line Course-selecting System Based on J2EE
YANG Peng;ZENG Zhe-jun
..............page:108-109,112
Application of MATLAB in Calculation Formula of CWR's Buckling
MAO Jian-hong;TANG Jin-feng
..............page:110-112
Research on Structure of Browser/Server
XIONG Jin;TAO Jun-cai
..............page:113-115
Research on Internet-based Remote Fault Diagnosis System
AO Rong-qing;Ao Ting
..............page:97-99,102
Development and Implementation of a Typical Parallel Programming Paradigm "Manager-Worker" in Design Pattern Way
CHEN Su-fen;WAN Jian-yi;ZENG Xue-qiang;XUE Jin-yun
..............page:1-4,16
Program Composition Method Summary on CLDC/MIDP Client
LI Chong;LUO Jia-rong;WANG Hua-Zhong;LIU Jun
..............page:5-7,10
Several Methods of Improving Java Program Performance
XIE Xiao-Lan;HAN Ke-yi;WANG Lin
..............page:8-10
Research on Unified User Modeling Technology Based on UML
PI Guo-min
..............page:14-16
Application of Neural Network Vector Quantization Technology in Speech Encoding
LUO Yan-fen;WAN Guo-jin;HUANG jian-hong
..............page:20-22
An RS-MAXNET Network Classifier Based on Rough Set Theory
XU Jian-feng;LIU Lan;QIU Tao-rong;BAI Xiao-ming
..............page:23-26,29
Knowledge Representation and Study of Enterprise Ontology Modeling
JIANG Yi;PAN Yan-hua;GE Shi-lun
..............page:30-34,37
Detecting Masquerades Based on Keystroke Dynamics of Unix Commands
LI Liang;ZHAO Qiang;CHEN Zhi-wen
..............page:95-96
Safe E-securities System
WANG Long-jie
..............page:91-94
Building Secure Electronic Commerce Web Site
SONG Che-mei
..............page:87-90,94
Design for Integration of Personal Firewall and Intrusion Detection
ZHAO Xue-min;SU JIN-hai;QI Min-yong
..............page:84-86
One Cipher-coding Arithmetic Based on Hill Cipher
WANG Wei-jin;YUAN Ji-xue
..............page:81-83,86
Implementation of Demo Platform for Medical Image Processing
TU Sheng-xian;YANG Feng
..............page:78-80
Query Optimization Strategy of RDBMS
DONG Yu-jie;LI Xiao-jun
..............page:72-74
Design of Data Warehouse in Cadre Promotion Decision Support System
WANG Kai;LIU Lian-zhong
..............page:68-71
Decision Support System in Telecom with Data Warehouse and Data Mining
FAN Li-xia;ZHANG Xue-lan
..............page:65-67
Broadcasting Station's Send and Receive File System Based on MIDAS
LIU Kai;TANG Ji-yong;BAI Xin-yue;HE Jian;YANG Feng
..............page:63-64,67
Research on Lock and Dead Lock of SQL Server Database
Dong Gang
..............page:52-55
Design of Optimization Software of PHS Network Based on GIS Technology
LI Li;WEN Xiang-ming;JIN Hui
..............page:47-49,77
Technology of Automatically Drawing Network Topology Based on VC
LE Xiao-yan;ZHOU Shao-mei;TU Rong-jun
..............page:41-43,46
Campus Network Optimization Based on 802. 1x
WU Hua-guang
..............page:38-40
ASP. NET Technology and Its Application in Enterprise Official System
ZHANG Neng-li;Wan Xin;WANG Rui
..............page:121-122,126
Research on Interoperation of Spatial Data Based on GML
LUO Yu-dong
..............page:123-126