Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2004 Issue 12
Application of Database Programming Technology Based on ADO in VC ++
xu zuo ; kang bo ; lv bing chao
..............page:92-94,98
Construction of SCADA Communication Server Software Based on RMI
zhu qing hua ; chen jian yun ; jiang shi lin ; huang hai yun
..............page:95-98
The FPGA Design Based on Handel-C Language
yang yi ; fang qian sheng
..............page:99-102
Implementation of Flexible Salary Management System Based on PowerBuilder
wang tao ; geng guo hua ; zhou ming quan
..............page:103-105
Primary Factors of Restricting IPv6 Deployment
xu jin ping ; wang yao qing
..............page:89-91
Enhancing Performance of Web Servers by Using Cache Proxy Based on Content
song qing zuo ; li tao shen
..............page:86-88
A New Method for Non-Components Uploading Files Based on ASP
zhou qing ; wang xu yue
..............page:83-85,144
Modeling of AOP Technologies with Extension of UML
zeng lu ; zhang li chen
..............page:106-107,110
A Design and Implementation about Static Analysis Tool
li ya hong ; hao ke gang ; ge zuo
..............page:117-119
Polygon Approximation Method Based on Area Error
zhang xing ping ; geng guo hua ; zhou ming quan
..............page:120-122
Design and Application of Overall Topological Sort Algorithm in AOV Network
zhu li hua ; wang ru chuan
..............page:123-125
Application of.NET Component Technology in MIS
xiao qin guo ; lu hai zhou
..............page:108-110
XQuery View Mechanism
liu zheng zuo ; xie rong chuan
..............page:111-113,116
Recognition of Software Reuse
yu hai yong ; song yu ; liu wei da
..............page:114-116
Intrusion Detection Using the Improved Weight Tree
di su lan ; zheng cheng ; le yi
..............page:62-64
Modeling Computer Virus Spreading over Network
chen zuo ; wang yi ; zhu huai hong
..............page:59-61,64
Design and Implementation of a System about Network Security and Watch Using WinPcap
wu li hua ; zhang li ; zeng zhi yuan
..............page:55-58
Analysis and Implementation of Key Exchange Protocol Based on Braid Groups
cao yi ; he wei hong
..............page:53-54,58
Application Research of Data Mining and Mobile Agent Technology in Intrusion Detection
yang xue gang ; wang ru chuan ; chen yun fang
..............page:50-52,141
Non- Minimum Phase System Control Based on Nonlinear PID
zhang de xiang ; liu kai feng ; fang bin
..............page:4-6,18
A Computer System for Traffic Parameters Based on Kalman Filter
chen yang ; zhou ming quan ; geng guo hua
..............page:7-9,102
Network Information Management of Vending Machine Based on Mixed Mode
zhao hai lin ; jin zuo
..............page:10-12,47
A Strategy of Structural Analysis in Typeset Mathematical Expressions Recognition
li fen hua ; tian xue dong
..............page:13-15,88
Application of Contrast Modulation to Fusion of Medicine Image
lv xiao zuo ; zhang zuo
..............page:16-18
The System of Automatic Drive Based on Intelligent Fuzzy Control
wang ying jian ; wang yu feng ; fan bi shuang
..............page:19-20,23
Research on Digitalized Course of Historical Relics in Archaeological Studies
fan shao rong ; zhou ming quan ; ji li yan
..............page:21-23
Virtual Instrument Based on Mixed Programming with MATLAB and VC
li dai qiang ; li cheng gui ; zhang qing rong
..............page:24-25,29
Evaluation Method in E- Learning Based on BP Neural Networks
he shi ming ; shen jun
..............page:26-29
Research of Fault Diagnosis Based on Neural Networks
pan zuo ; jiang chao hua ; zhong zuo
..............page:30-31,35
Network Shopping System Based on Component Technology
ding jian ; hu jin chu
..............page:36-38
Extracting Contour in 3-D Surface Reconstruction Based on Convex Hull Algorithm
zeng zuo ; chen xiao ; zhou hong ; zhou jian zhong
..............page:39-41,44
The Research of E_business Based on ebXML
wu zuo zhuo ; tong heng qing ; liu xi yu
..............page:42-44
Implementation of WebGIS Based on B/S Model in Distribution Network of Electric Power
ruan ping ; wang hua ; guo bing qing
..............page:45-47
The Null Problem in SQL
pan na ; mao yu guang ; han bo
..............page:126-128,131
Algorithm of KPCA and Its Application in Stock Market
zhang zuo ; zhang yan ping ; zhao zuo ; chen chuan ming
..............page:129-131
A New Way to Increase Computation Speed of High- scale SVM Training
yang lu ming ; li li
..............page:136-138
Research of Parallel File System and Parallel I/O
zeng bi qing ; chen zhi gang ; tan zuo ; deng xiao heng
..............page:79-82
Research of Service Creation Environment of NGN Based on Parlay API
sun li juan ; lu wei ; chen dan wei
..............page:76-78,119
An Expanded Role-Based Access Control Model
li li ; wang xiao ming ; zhang li ming
..............page:73-75,105
Attacking and Prevention of Computer Viruses on C4I System
xing yong gang ; liu zuo ; jin yong
..............page:70-72
The Countermeasures to SYN Flooding Attack
gong zuo ; gu qiang ; cheng zuo ; sun zhi xin
..............page:67-69,138
Ways of Distributing and Administering Privilege Based on Role
ren shan quan ; lv qiang ; qian pei de
..............page:65-66,82
R_ time Table in Temporal Planning Problem and Its Application
qian fu lan ; cheng jia xing ; zuo tao ; yu cheng dan
..............page:139-141