Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2003 Issue 12
Scenarios Development in Human-Computer Interaction
zhang xiang bo ; xing chao wei
..............page:99-101
Distribution,Layered Modeling and Performing of Workflow System Based on Web
jiao yu feng ; wang zuo
..............page:96-98,101
Research on Application of Filter Technology in Web Personalization Services
wang zuo yin ; cui zhi ming
..............page:93-95
Application of Software Engineering Method in Development of Distance Education Courseware
sun li qun ; yi xuan wen ; li da bin ; gu sheng gao
..............page:90-92
A New Method of Dynamical Data Exchange between Applications
liu hong shen
..............page:86-89
A Study on Applications of 2-dimension Wavelet Transform to Image Compressing
jiang li ; xu yi xian
..............page:82-85,89
The Application in Tracking Simulation System Based on DirectDraw
lu bin ; qi qiang
..............page:79-81
Face Recognition: A Survey
he dong feng ; ling jie
..............page:75-78
Application of Wavelet and Laplacian Operator in Pipe Welding Flaw Image Detection
li zuo ; luo li ; jiang yong da
..............page:71-74
Locking Scheme for MMDB
zhu ming ; li hang ; wang li
..............page:68-70,95
Secure Electronic Commerce Structured by PKI
zuo shi cai ; lan zhen ping ; sun yan guo
..............page:65-67,121
Web-based Data Mining Technology
chen er zhong ; jiang li hua
..............page:61-64
The Summarazation of Content-based Audio Retrieval
zhu ai hong ; li lian
..............page:58-60,64
Security Scheme of Campus Yicatong Application System
shi run hua ; ge li na ; zhong cheng
..............page:55-57
The Way of Realization of Data Security
fan zhi ping
..............page:53-54,57
Application of Multi-Agent in Intrusion Detection Model
liu zuo ; jiang hao ; jiang wen feng
..............page:50-52
Optimization of Oracle Database Based on PL/SQL
wang qiu sheng
..............page:46-49,52
IKE Negotiation for NAT-Traversal
liu hai jing ; wang li
..............page:42-45
Realization of Intelligent Answer System Supporting Natural Language
zhang zheng lan ; li shan
..............page:39-41
Data Perspective Function under Excel 2002
jiang li ; shen yong
..............page:37-38,74
Research of CORBA Technology in E-police System
shu yu hua ; lv han xing ; cheng zhen
..............page:34-36,118
Study and Design of Knowledge Database Model Based on Web Information Field
zhang qiu yu ; zhang hong ; ma yan hong
..............page:31-33,81
Development of MIS Based on Use Case Driven and UML
geng duan ; fang xu sheng
..............page:1-3,6
Application of Network Technology in Fiber Optic Sensor Safety Monitoring System
jiang de sheng ; chen feng chun
..............page:4-6
Application of Computer Vision in Object Location of Robot
wang jun xiu ; kong bin
..............page:7-10
Computer-GPS Serial Communication Technique under Win32 Environment
li rong yan ; he zheng yao ; zhang yi peng
..............page:11-13
A Probe on Model of Secure Electronic Payment for B2B Based on WEB
li jun bing ; bai sheng meng ; huang min
..............page:14-16,19
Modeling and Design of B/S Mode School Management System with UML
zhang nan ping ; wang wei ; xia hong xia
..............page:17-19
Distributed Query Processing System Based on Technology of Mobile Agent
liu hua zhi ; li yi bo ; li lian ; zhu ai hong
..............page:20-22,25
Key Technique in Experimental Simulation System Development for Principles of Chemical Engineering
song xiao chun ; lu zai han ; zuo lie xiang
..............page:23-25
Study on Simulation of Multitask Process of Manufacturing Lines
lv jin xia ; jiang zuo
..............page:26-27,110
Analysis of Network Accounting System
he zhi yong ; xian qian kun
..............page:28-30,92
Realization of Reports Using Language C under UNIX System
zhao bin ; zheng you cai
..............page:102-104
Designing Web Application of MVC Pattern with Struts
zhang zuo ; du you fu ; zhang nan ping
..............page:105-107
Security Analysis of ASP Network Database
chen bo ; yang yi min
..............page:108-110
Knowledge's Acquirement and Denotation of Pumpcrete Expert System
xia hong xia ; yang ou ; zhong zuo ; pan zuo
..............page:113-115
A Hash Function Construction Based on Rijndael
zheng li juan ; wang bao yi ; qi jian gang ; zhang chang you
..............page:119-121
Implementation of Algorithm and Improvement of a Composite Numerical Method
li fu peng ; wang ji wen
..............page:122-124
Improvement of a Rough Sets Induction Algorithm
chen li zuo ; chen yan ; ren hong wang
..............page:125-封三