Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Study
1002-2422
2005 Issue 5
The Mobile IP Technology
Liang Zhirong
..............page:4-6
Sensor Network and Its Operating System
Li Lina;Liao Minghong
..............page:7-8,11
Developing Teaching Information Management System Based on Delphi and ADO
Li Quanbin;Huang Chang
..............page:9-11
The Design of Automatic Copying Meter System based on LonWorks
Zhi Shuya;Gao Anbang;Li Zhonghua
..............page:12-13
How to Build BBS of Telnet and Web under Linux
Hong Dongming
..............page:14-15
Design and Realization of Internet Connection Sharing
Jiang Shuju
..............page:16-17
A WEB Server Based on Embedded TCP/IP Protocol-uIP
Zou Tiejun;Zhang Guoli;Yu Linghong;Sun Qingxiang;Cui Yunhong
..............page:17-19
Security of Defending in ISO/OSI Network Architechture
Yang Hua;Zhong Lehai
..............page:20-22
Communication of Functions in C Language
Li Feng
..............page:22-23
The Method and Implementation of Using ADO.NET to Access Database
Deng Weibin;Zhou Yumin
..............page:24-25
Fast Configuration NCRE Server with Windows Script
Luo Xingxian
..............page:27-28
Exception Catching and Handling in Windows2000、XP
Zhao Haidong;Cai Dongqi;Guo Zhiguo
..............page:29-31
The Development of Flash Remoting in .NET
Zhou Nianxi
..............page:31-32
The Application of ADO and OLE DB in Visual Basic6.0
Mei Shenxin;Mei Lin
..............page:35-36
An Example of Applying JSP and JDBC to Make Network Courseware
Liu Shengqiang;Fang Cunzhong
..............page:37-38
Web Usage Mining and Its Application in Tourism of Electronic Business
Wu Haizhen;Zheng Qunming
..............page:41-42
Experiment-method and Procedure Design Architecture
Zhang Shilu;Yuan Lihui
..............page:43-44
Using ASP to Protect Dynamic HTML
Li Aiqi
..............page:44-45
An Example Analysis of Opening File Mode Error in C Language
Zhang Fusong;Du Jiang
..............page:46-47
The Design Entry Methods of Foundation
Shen Zubin
..............page:48-49
Some Proxy Signature Schemes Based on Discrete Logarithms
Cai Qinghua;Sun Quanshang
..............page:50-51
A Rapid Recovery Method of Computer System By Programming
Yang Fuhua
..............page:52-53
Computer Aid Analysis of Disassembly Program
Jiao Renpu
..............page:53-54
Windows XP Installation and Clone
Zhang Hongwei
..............page:59-60
Briefly Discussing Ways of Data "Copy" in SQL Server2000
Chen Manhong
..............page:61-63
Making Math Formulas Skillfully with Office Tools
Zou Jie
..............page:63-封三
zheng gao qi shi
..............page:封四