Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2000 Issue 8
The Network System for Toll Election, Monitor and Control on Road
li ming hui ; xu feng lin ; li su fang
..............page:84-84,87
Programming and Optimization of CPU Emulation Program
WANG Ping;WANG Xian-feng
..............page:85-87
Multimedia Application Program Designing and Implement with VB6.0
zhang xian hai ; wu ling da ; wang chen
..............page:88-91
The Method to Implement RAID under Cluster Workstations Environment
LI Dong-hui;LIN Xue-mei
..............page:82-83,87
The Application of Business Component in Master Production Schedule Management Subsystem
yang li jie ; zheng ming chun ; feng mei
..............page:80-81,102
A Research and Development of Systems with Hybrid Structure of C/S and B/S Modes in CIMS System
wang jin qing ; zhou liang ; liu hong gen ; zuo yin chang
..............page:77-79
Applications of Virtual Reality Technology in Thermal System Simulation
XIANG Wen-guo;CAI Ning-sheng
..............page:73-76
Design and Implementation of C3I Evaluation Integrated Environment Based on Component Technology
xie wei ping ; deng su ; sha ji chang
..............page:70-72,79
The Study on VR-based Space Robot Tele-operating Simulation
TANG Hao-xuan;HONG Bing-rong
..............page:67-69
Supporting Flash Movies with ActiveX Control in Application Development
ZENG Yi-min;YE Ru-qiang
..............page:66-66,76
Production Management Information System Modeling in Clothing Manufacture
SHI Lei;YANG Xiao-hu
..............page:64-65,76
Design and Research of Fibre Channel Based Storage Area Network
li yang ; zhou jing li ; yu sheng sheng
..............page:61-63
Distributed Transactions Using CORBA
YUAN An-xin;ZENG Chui-chang
..............page:58-60,91
VPN Tunneling Technology
SUN Wei-qing;ZHAO Yi-qun
..............page:55-57
Network Programming of Windows Sockets
wang guang wei ; li wei zuo ; qu ming hai
..............page:51-54
Free Email Configuration under Linux OS
wang chang qing ; wang xin ping ; li qing yun ; wang jian
..............page:49-50
The Design for the Traffic Management and Command System Based on TCP/IP
WANG Xiao-dong;ZHANG Xi-ping
..............page:47-48
Fragmentation and Path MTU Discovery
CHEN Wei;QUAN Tian-tong
..............page:36-39
Probing into DNA for Web Application
HE Xin;SHEN Lian-guan
..............page:33-35
Voting Protocol in Distributed Systems
yang yun wei ; zhang ge ; gao jian hua
..............page:30-32
The Research of the Intelligent Medium Agent
YE Guo-qing
..............page:27-29
Fine-grained Parallel Evolutionary Algorithm Based-on Space Ranking
HUANG Zhang-can;CHEN Si-duo
..............page:4-5
Analysis and Research of Complex Huge System's Evaluation Architecture
liu ke sheng ; xu lei ; zhang wei ming ; deng su
..............page:6-8,11
Application of Wireless Data Network in the Field of Traffic & Communications
zou xian min ; xu jian min ; chen yan
..............page:17-18,26
Analysis & Application of Virtual Local Area Network Technique
wu chang guo ; shen jin long ; chen hui nan ; yang geng
..............page:19-20,43
Performance Comparison of Two Flow Control Mechanisms in ATM Networks
zhang xiao lin ; wu jie yi ; zhang zuo bing ; fei xiang
..............page:21-22,39
A TV News Process System Based on the Networking Multimedia Technology
LIN Zhi-qing;CHEN Fu-min
..............page:23-24,29
Physical Memory Management in Linux
LOU Cheng-hui;SUN Shou-qian
..............page:92-93
Visual Database Tool Design for SCADA System
jiang xian gang ; cui xia ping ; tu xiao bin
..............page:94-95,105
The Talented Persons Managed System Based on JAVA
huang xiao tao ; zuo hai yan ; zhang ming ; lu zhi ming ; li long ; dai bin hua
..............page:96-97
Data Mining from Telecommunication Network Alarm Database
mao guang li ; huang zuo long ; luo chang long
..............page:98-99
A Method of Eye Edge Extraction Based on Image Segmentation
lin feng ; liu zheng kai ; yu neng hai
..............page:100-102
Security Improvement of Linux by LKM
SONG Li-xin;LI Shan-ping
..............page:103-105
The Several Faults of VBRT300 and It's Maintenance Method
ZHONG Jiu-hui
..............page:106-108