Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2004 Issue 3
The Current Situation and Prospects of Pitch Detection
feng kang ; shi hui zuo
..............page:95-98,101
A Semiotic Method in Model-Based HCI System Analysis
zhang xiang bo
..............page:99-101
The Application of Recursive Function
yang xiao
..............page:102-103,119
Mining Generalized Association Rules on Multilevel Concept
gao li ping ; xia min jie
..............page:104-106
A Method of Intrusion Detection on Fuzzy C-means Based on Clone
luo jing ; dong zuo ; hua peng
..............page:107-109
Research on Judgement of an Antisymmetric Relation
yang si chun ; zhou yun xia
..............page:93-94
Research on Multi-Agent System and Distributed AI
wu hai ying ; wang xu an
..............page:80-82
Virtual Instrument Software Labview and Data Acquisition
guan xu ; zhang chun mei ; wang shang jin
..............page:77-79
Using MFC DAO to Manage the Hearing Exam Pool of English
song li ya ; zhao guo dong
..............page:74-76,115
Study on Query Technology of Multimedia Database
zhang zheng lan ; li dong mei ; zhao chun yan
..............page:70-73
Database Middleware Based on Web Services
xu ze feng ; wang zhi jian ; xu feng ; lv xiao yan
..............page:64-66
Performance Evaluation of Service Models in Broadband Network
zhu jun ; li xiao hui ; ding da wei
..............page:62-63,66
Security of Mobile Agent in Hostile Environment
wan ding sheng ; bian hai hong ; chen yuan bin
..............page:110-112
A Design Analysis on NIDS
yu yue ; qin huai qing ; luo sen lin
..............page:113-115
Application and Study of Elliptic Curve Cryptosystem for Electronic Document
liu tao ; hou zheng feng
..............page:116-119
Design and Implementation of Network Monitor System
fu jie ; fan qing biao ; jin zuo dong
..............page:120-122
Analysis and Improvement of Internet Key Exchange
guo feng juan ; song yu
..............page:123-124,封三
Distributed Intrusion Detection System Based on Data Mining and Agent
zhang dan hui ; zuo zhen sheng
..............page:125-封三
Realization of Book-shopping System on Network Based on ASP
meng jian liang ; liu wei da ; pang chun jiang ; cai zuo zuo ; liu jun
..............page:59-61,112
A Study of New Internet Protocol IPv6 and Immigration Technology
chen xiang zhang
..............page:57-58,86
An HA Server Cluster Scheme Based on Linux
li yuan min ; ge li na
..............page:55-56,82
Routing SOAP Messages with WSE
zhao jian li ; song yu
..............page:52-54,92
A Serial Port Communication Class Realized with Multithread and Overlapped I/O
long fei ; li xiao fan ; cai zhi kai ; gao qi feng
..............page:49-51,69
The Realization of Press Office Business in Network
wang hai xiang ; huang dong ; tao jing
..............page:46-48
Information Exchange Technology for JSP E-business Based on XML
tang ting an ; chen xin ; liu fan mao ; chen xin du
..............page:44-45,79
Research on Exception Mode of J2EE Web Application
li fei yi
..............page:41-43
Implement Object Oriented BSP by Using EC+ +
wu an jun ; xu xue zhou
..............page:38-40
Study and Implementation of Concurrent Multitask Based on Java Multithread
wang jin hai ; jiang wu xue
..............page:34-37
BGP Protocol Implementation Technology Based on IPv6
zhao bo ; shen jun yi
..............page:1-3,109
Report Server Based on MVC and Struts
wang hua rong ; su hong yi
..............page:4-6,48
Data Integration Based on ODS and Data Update Strategy
chen dai zuo ; guo yong sheng ; xu li zhen ; dong yi sheng
..............page:7-9
Design of MIS Software Using EJB and Swing
shi lei ; xu xue zhou
..............page:10-13,16
Design of Office Automation Based on Web and Workflow
wang yong ; kang qin ma
..............page:14-16
Research on Improving C/S Pattern's Maintainability
gao zhi gang ; bian xiao fan ; zhang zhi qiang
..............page:17-18,22
Analysis on Search Engine
liu zuo ; zheng you cai
..............page:19-22
Design and Implementation of Automatic Software Download in Configuration Management
zheng wen ke ; xu xue zhou
..............page:23-24,28
Web Browser Emulator Based on XML
yang bo ; wang cheng
..............page:25-28
Research on Path Coverage Based on DDGRAPH
ding xue mei ; lun li jun
..............page:29-31
Realization of Data Interaction between Visual C+ +and Matlab
zheng tao ping ; chen qi juan
..............page:32-33,37