Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer and Information Technology
1005-1228
2013 Issue 2
Mobile Application Design Based on Cognitive Situations
KE Xing-hui;LIU Chang-yong;LONG Qun-bing;MENG Shi-min
..............
page:1-4
Research of Genetic Algorithms and Application
LI Jin-juan
..............
page:5-7,12
The Research of Wavelet in Classification of Benign and Malignant Liver Tumor in CT Images
JIANG Hui;QIN Shi-gang
..............
page:8-12
Medical Image Enhancement Based on Edge Detection
LAI Si-yu;WANG Yu-feng;WANG Juan
..............
page:13-16
A Method Base on Detecting for O Sealing Ring Size
XIAO Feng;WANG He-shun
..............
page:17-18,71
The Conversion of Video Image Format between YUV420 and RGB24 Based on VC++
YAN Jing
..............
page:19-21,25
Trusted Eencryption Disk Research and Implementation Based on Virtual Disk
CHENG Guo-yong;HAN Yong-fei;WANG Hui-xia
..............
page:22-25
The Typical Interference Environment Design Under Laboratory And Field Conditions
ZENG Xing-zhi;YUAN Long;HU Rong
..............
page:29-31
A Fraction-Delay Estimation Method Based on QRD-RLS
LI Bei
..............
page:26-28,47,63
The Test System Design of the High Rate Optical Interface Based on CPRI V4.2
LIU Hao
..............
page:32-35
Improved Design and Implementation of Automated Unit Testing Framework NUnit
WANG Tong
..............
page:36-41
The Application of Feature Extraction in the Three-dimensional Digital Platform
YE Wen-hui
..............
page:42-44
Design of City E-government Supermarket Management System Based on Hiberarchy Architecture
LIU Yue
..............
page:45-47
The Design and Realization of Management System of Material Evaluation for High Schools Based on Asp.net
WEN Hua
..............
page:48-50,53
The Design and Application Based on the B/S Project Group Management System
FANG Kai-hong;ZENG Ling-feng
..............
page:51-53
Implementation of MD5 Fast Crack Based on GPU Cluster
YANG Sheng-bin
..............
page:54-56
A Kind of Simple and Efficient Public Key Cryptographic Algorithm of Safety Analysis
HU Xuan-pan;PAN Yu
..............
page:57-60
A Application Isolation Implement Based on Trusted Measurement
JIANG Lin-Jian
..............
page:61-63
A Route Algorithm Based on Wireless Sensor Network LEACH Protocol
CHEN Bin-wen
..............
page:64-66,74
A Password Authentication Key Exchange Protocol Based on Millionaire's Algorithm
XU Jun
..............
page:67-71
The Teaching Model Reform of Research and Practice in Network System Integration Course
WU Hai-yan;LI Guo-ping
..............
page:72-74