Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Knowledge and Technology
1009-3044
2005 Issue 11
An EDA-technology-based signal generator which has changeable period and pulse-width
PENG Feng-hua
..............
page:78-79
Practice and Probing on the System of Office Automation
SONG Guang-qiang;LI Zong-qiang;LI Xue-bin
..............
page:79-80
Draw Sine Function Image with Computer
MENG Zhi-guo
..............
page:76-77
To study the temperature distribution of frozen soil in boundary element technical
KONG Jun-xiang
..............
page:73-76
Using Kodak Controls to Collect Image in VC
LIN Li-ping
..............
page:71-72
Which do you choose: Google's Toolbar or Deskbar
CHEN Li-ya
..............
page:69-70
Programming and Design of Enterprise Infomation Construction for Broadcasting Station
HU Fu-xiang;CHEN Bo-bin
..............
page:66-68
Fuzzy Support Vector Machine for Eye States Detection
YIN Fang-ping;YANG Ying-xian;ZHOU Bin
..............
page:64-66
Using the Microsoft Office Word to Resolve the Problems Caused by Inserted AutoCAD Figures
WANG Zhen-ni
..............
page:62-64
hui ji dian suan hua an quan yin huan yu fang fan cuo shi
gao yun
..............
page:81-82
Design Several Functions For The TextBox's Operation
LUO You-ping
..............
page:61-62
The application and investgation of String approximate match based on web
LI Xia;BAI Li
..............
page:59-60
Research and Design of A Universal OLAP System
LI Ling-yan
..............
page:57-59
Research On Application of YCbCr Color Space And KL Transform In Face Detection System
HUANG Xuan;WANG Jun-xiong;XIE Xi-feng
..............
page:55-57
Trust Transfer and Belief Aggregate in Multi-agent
HU Wen-hua;DENG An-sheng
..............
page:52-54
The Design of Embedded IP Camera Based on the FPGA
XIE Xi-feng;LIU Zheng-yi;HUANG Xuan
..............
page:50-52
java xu ni ji you hua ji shu zai yi dong tong xin she bei zhong de ying yong yan jiu
ye yu guang
..............
page:48-50
wang ge ji wang ge ji suan ji shu zong shu
ma shu yue ; wang jian
..............
page:45-47
ru qin jian ce ji shu guo cheng ji fen lei bi jiao
yang jun
..............
page:43-45
A Implementation Strategy About Web-Based Distributed Graphic Simulation
PANG Shuang-yu
..............
page:42-43
Research of Copying Table Technology Based on Visual FoxPro Technique
REN Chuan-cheng;PAN Dong-jing;SUN Zhi-zhuo
..............
page:13-14
The Design And Application Of the Customs Inspection Controlling System on Export Processing Zone
SHEN Jie;WEI Hui-feng;LIU Li-xing
..............
page:11-13
The Dynamic Universal Editing Interface Designed In The B/S Model
SUN Lei
..............
page:9-11
Research on strategies and risks of Database Security
XU Yong-qing;XU Li-zhen
..............
page:7-9
The Development of Electric Power Equipment Inviting and Bidding Management Information System based on COM+/WebService Multi_tier Distributed Architecture
MA Tai-hui;MA Yong-mei
..............
page:5-7
Research on Creating Database Application Program Using Database Object Variable in VB
LIU Ai-hua
..............
page:2-5
Applied Development in Teaching Management System on Multi-dimensional Assoiation Rules
PEI Fang;ZHENG Ying;DU Li-fang
..............
page:1-2
NAT Technology and its Application
TIAN Xiang-hong
..............
page:39-41
The Principles of OSPF Protocol and OSPF Vulnerability Management
SHI Chuang-ming
..............
page:37-39
The Long-Distance Examination System Based on Web Database
ZHAO Zhen-qi
..............
page:15-16
Visit to VB Distant Database
LIU Yan-yun
..............
page:17-18
Research on application of Web-based data mining to electronic commerce
ZHOU Xiang;ZHENG Ying-pin;WANG Ling-qun
..............
page:18-20
A Scheme of Multi-path Transmission for video streaming Base on Multiple Description Coding
DOU Ya-ling;GUO Hong-xing;LUO Fang-jun
..............
page:20-22
A Study on Security of B/S Structure's Net Test System
XU Feng
..............
page:22-24
Application of Trusted Network Connect (TNC) Architecture
ZHANG Tao
..............
page:24-26
Exploration of Anti-Spam Technology
ZHU Jun;ZHANG Ning
..............
page:26-28
jie dian shu mu dui zi zu zhi wang luo lu you xie yi xing neng ying xiang fen xi
li xiao yan
..............
page:28-29
Analysis of Compatibility Problem between IPSec and NAT based on Agent
PENG Yin-xiang
..............
page:29-31
Mode and Construction of the Network Education System
ZHANG Hua-gui;WANG Hai-yan
..............
page:31-34
xiao yuan wang luo xin wen gong gao xi tong de she ji yu shi xian
ni jian xin
..............
page:34-35
Using ASP technology realization dynamic columnar diagram of data
ZENG Bin;ZHANG Yu-xia
..............
page:35-36
yin ru visual sourcesafe ruan jian shi xian ban ben guan li
wu liang
..............
page:82-84
ying yong gpib ji shu kai fa zi dong ce shi xi tong
lu yu ping
..............
page:84-85
xu qiu gong cheng de yan jiu bei jing yu yi yi
fang zheng yang ; shao
..............
page:85-86
Research on the Application of Multimedia Computer Assisted Instruction
ZHANG Qian;CAI Rui-ying
..............
page:86-88
A teaching model research based on Internet/Intranet in the information technology course
BAI Xue;CHEN Guang-shan
..............
page:88-90
A WEB Based Case Study Teaching System Design
CHEN Jia-yu
..............
page:90-91
Instruction Demo Program for Tower of Hanoi Based on Java
ZHANG Shi-hui;LUO Bai-ling
..............
page:92-94
According To NET Environment Bottom Of The Multi-Media Teaching Break Development And Research
SUN Zheng-yu
..............
page:95-96
dian nao zhi shi yu ji shu xue shu jiao liu ban zheng gao xi ze
..............
page:封二