Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2003 Issue 6
Method of Workflow Modeling Based on Petri Net
zhang xin yi ; li yan
..............page:91-93,97
Application of Association Rules in Medical Data Analysis
li hong ; cai zhi hua
..............page:94-97
Simplication of the Binary Discernibility Matrix
wang xi lei ; wang lei ; ma tao ; wang jian ; zhou guo liang
..............page:101-103
Technology of Word Handling in Building Word Database of JiaGuWen
li sheng ming ; tan zhi peng
..............page:104-105,108
A Layer Analysis Method of Network Security
li min ; fei yao ping
..............page:106-108
A Study on Object-Oriented Software Metrics
zhang mao zuo ; fang mu yun
..............page:109-封三
Fuzzy Comprehensive Evaluation of Multiple Psychological Factors
wang jing ; wang jia yang ; wang zuo rong ; huang dong
..............page:88-90
Application of Data Mining Techniques in Radio Monitor
yao fang bing ; wang lun wen ; zhang ling
..............page:40-41,49
Interface of Catching of Real Time Clock with C Language Interruption in Test & Control System
huang ju sheng ; zhang xu ; peng geng xin
..............page:37-39
PB Encapsulates WindowsAPI Drawing Functions' Method
tang ting an ; chen xin ; liu fan mao ; chen xin du
..............page:32-33,36
Application of Way about Computer Animate Based on VB
lu bin ; he you jin
..............page:29-31
Face Recognition Based on Wavelet Neural Network
wang xin chun ; wang bao bao
..............page:27-28,31
Comparing of Several Algorithms of Fingerprint Directional Map
zhang lei ; lu chao yang ; yang de ying
..............page:24-26
Development Model and Implementation for Shared Multimedia Teaching System
dong ling ; chen yi min
..............page:22-23,26
Realization of Message-Center Based on XML and MIME Message
yang an le ; cheng hui xia
..............page:1-3,6
A Research of Adaptability of Intrusion Detection System
le yi ; zheng cheng
..............page:4-6
Port Scanning Techniques and Analysis of Defense
ding chang fu ; fang min ; xu liang
..............page:7-9,12
Network Processor and Its Application in Layer 3 Forwarding
song cheng jie ; zhao rong cai ; zhang zuo
..............page:10-12
Preventing IP Address Embezzlement in Local Area Network
jing guang wen ; lv han xing ; li jing li
..............page:16-18,21
Fast Optimization for Logic Functions Based on Observability-don't-care-set
guan zhi jin ; zhang yi qing ; qiu jian lin
..............page:86-87,90
Improved Genetic Algorithms
gu feng ; wu yong ; tang jun
..............page:80-81,85
Comparison of Two Methods Used to Data Preprocessing for One Kind of Neural Network
yao hong xing ; huang zheng liang ; liu zhi gui
..............page:77-79
How to Build Multidimensional Data Model Basing on Relational DB and Build a Data Market
jiang wei jin ; tang dai xi ; liu qing bao
..............page:74-76
The Thought of How to Design VPN
chen dan zuo
..............page:71-73,76
Improvement of Software Quality Assurance Based on QFD
yang zuo ; li chun qiang ; chen chun ling
..............page:67-70
Study on Typical Problems of Concurrent Visit to Data
qian xue zhong ; huang xiang qian
..............page:64-66,70
The Application of Middleware Technique in Programming Design
wang an bao ; guo jian xing ; wang xiao jing ; hu jin chu
..............page:60-63
An Application Model Based on Multi-Agent Technology
wang xin ; song yu ; hu wei hua ; zhang zhen xing
..............page:57-59,63
Research on Object-Oriented Software Testing
liu jin yan ; yin zhi ben ; zuo juan ru
..............page:53-56
The Normalization of XQuery Process Engine
liu zheng zuo ; xie rong chuan ; li wei
..............page:50-52,56
The Methodology of Development Agent-based Software System
zheng guang hai ; qu ying wei
..............page:46-49
Image Transmission in Electronic Police System
feng dan ru ; lu chao yang
..............page:44-45,封三
Study on Tank Maneuver Model in Combat Simulation System of Tank Element
huang jian ming ; zhao wan ji ; chen yan biao
..............page:42-43,79