Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information
1002-1965
2005 Issue 8
lun tu shu guan zhe xue de he xin guan nian gong neng
zhang tong mei ; wang mei
..............page:81-82,80
lun zhi shi " ban jiao liu "
yang ju zhi ; qin yi min
..............page:83-84,87
Credit Information Infrastructure Construction and Government Activities
liu zuo ; gu feng ; wang fang hua
..............page:88-89
ge xing hua zhu dong xin xi fu wu shi xian yan jiu
zhang yu ye ; li lian ; wang chun zuo
..............page:71-72
oai-pmh xie yi zai shu zi zi yuan gong xiang zhong de ying yong
wei bin ; zhang ming guo
..............page:68-70
ying yong xml mo shi miao shu marc ge shi de tan tao
zhang jian
..............page:66-67,70
shu ju wa jue zai tu shu guan gong zuo zhong de ying yong
liu xiao dong
..............page:63-65
Study on Fuzzy Multilayer Evaluation Model of Enterprise Knowledge Stocks
WANG Xiuhong;Wang Gaoping
..............page:8-10
Application of Content Analysis
qiu jun ping ; yu yi sheng ; zou fei
..............page:11-13
Chinese Matching Method Based on E-Government Thesaurus
Yang Fang
..............page:14-15,13
ji yu uml de wang shang shu dian xi tong jian mo yan jiu
xu guo hu ; xu fang
..............page:53-55
ji yu fen lei fang fa de nei rong guo lv tui jian ji shu
wang yan ; jing shao guang ; li xue yao ; yu jun
..............page:59-60,62
ji yu web fen bu shi zhuan jia xi tong de she ji yu yan jiu
li bao min ; li zuo nan
..............page:61-62
Study on Transferring Model and Sharing System of Tactic Knowledge
Cheng Yanxia;Wu Yingliang
..............page:16-17
Study of E-service Quality
Huang Minxue;Li Xiaoling
..............page:20-22
xie tong xue zai gong ying lian xie tong zhong de ying yong yan jiu
tang xiao bo ; huang yuan zuo
..............page:23-25
dui shu zi qian ming yan jiu cheng guo de ding liang fen xi
liu xiong jian ; hua zuo na
..............page:28-30,32
wen xian lao hua zhi biao de wei guan ce du fang fa ji qi qu jian gu ji
wei xiu xian ; qian zuo
..............page:31-32
Design and Implement of Web Table Information Extraction System
Zhai Dongsheng;Yang Yang
..............page:33-35
A Designing Method of Encryption / Decryption System Based on Shift-rounded Session Keys
huang guang qiu ; lv ding quan ; wang wei
..............page:36-37,39
guan lian wa jue zai wen xian jie yue li shi shu ju fen xi zhong de ying yong
peng yi pu ; xiong yong jun
..............page:40-41,44
The Concealed Data Searching Tool: Spyware
liu xiao yan ; ma min hu ; sun yong gang
..............page:42-44
Study on the IT Productivity Paradox Based on Three Levels
Xu Meifeng;PENG Aidong
..............page:45-48
xue ke dao hang ku jian she de guan jian wen ti yu ji shu
chen zhen yu
..............page:51-52,55
mian dui xue xi xing she hui de tu shu guan xi tong
guo ai hua
..............page:96-97,100
Characteristics of Knowledge-intensive Business Service
Li Hong
..............page:101-103
The Pricing Discrimination Tactics Research of the Information Goods
Wei Leiru;Wang Lei
..............page:104-106,109
tu shu guan zai qu yu xin xi fu wu ye fa zhan zhong de tui dong zuo yong
wang feng cui ; zhang yu feng ; liang xiao tian
..............page:110-112
Application of Visualization Technology in the WWW Information Retrieval
cao jin dan ; wang li wei ; qi yan li
..............page:113-116
chao wen ben jian suo mo shi de you hua tan tao
zhou qing lin
..............page:119-121
The Advantages and Challenges of Subscription Agent
Yuan Lin
..............page:122-125
dui tu shu guan wang zhan jian she de si kao
wei xiao ying
..............page:128-129
he bing yuan xiao tu shu guan mis xi tong ruan jian xuan xing
hu xiao jiang ; shi min ge
..............page:130-132,135
lun wo guo sheng yu ji gao xiao tu shu guan lian meng jian she
guan hong ; tian cang lin ; wang hao
..............page:133-135
wang luo huan jing xia gao xiao tu shu guan ge xing hua fu wu mo xing de gou jian
zhang jing ; huang chun juan
..............page:136-137