Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Knowledge and Technology
1009-3044
2005 Issue 21
The VB program on Characters or Text input testing
liu wen-hao liu chun-guang yantai vocational college; yantai 264000; china
..............
page:70-72
wu tan zhuang bei shu ju ku guan li xi tong she ji
deng hui ping ; zheng xin guan ; shi wen qing
..............
page:13-14
Database Backup and Restoration through Network
weng jian-yi taizhouvocational&technical college.taizhou; 318000.china
..............
page:15-16
ji suan ji shi yan shi ying jian she shi de wei hu
xia yu hong
..............
page:52-53
ji yu mp3 wen jian de you sheng ci dian de shi xian
chen yuan yang
..............
page:54-56
wang luo ke cheng she ji fang fa yu shi jian
ding zhi yan ; ding zhi zuo
..............
page:87-88
web3d ji shu zai yuan cheng jiao yu zhong de ying yong
han hao ; ren wan qiang
..............
page:90-91
qian ru shi yi tai wang de she ji yu shi xian
ou quan mei
..............
page:35-37
qian tan wang luo an quan zhong de fang fan ji shu
tan ying jun ; wang xiao yan
..............
page:37-39
Talk the Graphics Mode in the C Language
yang xin-feng lu qing-bin department of computer science & technology; nanyang institute of technology hennan nanyang 473000
..............
page:66-67
ying pan jia suo yu jie suo ji shu
yu wen zhong
..............
page:73-74
shi yong access jian li dang an guan li shu ju ku
huang jing
..............
page:17-18
TUser's Working Environment Management For Computing Laboratory
guo xu-ming faculty of information technology & electromechanical engineering; guangzhou university; guangzhou 510091; china
..............
page:50-52
Discussing the Courseware of Web Streaming Media
li yong-gan ji hao-zhe henan quality project vocational college; pingdingshan; henan 467000; china
..............
page:84-86
ji suan ji wen hua ji chu jiao xue mo shi tan tao
wang xiao yan ; sun jie
..............
page:88-90
Difficulties of Critical Data Protection in Small and Midsized Businesses and Countermeasure
li yu-yao department of information management; guangdong finance and economics college; guangzhou guangdong 510420; china
..............
page:3-5
Controlling and Applying About VB Builds Up On The Basis Of C/S On Network Communication
li qing jiangyin professional technical college jiangsu jiangyin 214433
..............
page:25-28
qian xi j2ee an quan ji zhi
lu wei
..............
page:45-46
li yong debug ming ling qian xi wei ji de gong zuo yuan li
du yi tong
..............
page:59-60
zhong xue xin xi ji shu ke jiao xue ru he shi ying gao su fa zhan de tan tao
xu xiao bo
..............
page:83-84
xue sheng xuan ke xi tong de fen xi yu she ji
zhang hong bo ; he chang ying ; wang yan ling
..............
page:95-96
Study of Image Threshold Methods' Selection and Algorithms Implementing for Image Segmentation
liu shuang teacher office ; guangdong qingyuan fucheng radio &tv university ; 511500
..............
page:68-70
Configure for Router of Network Address Translation
sun xiang-chun; li chun-juan (luohe vocational and technical college; luohe 462000; china)
..............
page:32-34
ji yu linux de wang luo she bei qu dong de yan jiu
lu dong ; wang kun
..............
page:29-31
Research of Teaching Strategy on Computer Programming Course
wang ping zhu yan-hui
..............
page:93-95
duo mei ti wang luo jiao shi de gong neng he you shi
huang qing zuo
..............
page:92-93
The Design and Realization of OA System based on MAPGIS
lu lu; ma xian-li (guangdong university of technology guangzhou 510090)
..............
page:78-80
qiao yong excel vb ji word bian ji cheng ji
liu zuo
..............
page:63-64
qian xi ji suan ji wang luo an quan ji shu
zhang guo feng
..............
page:40-42
mpls wang luo ji shu ji ying yong
xie feng mei ; zhang jian qing
..............
page:21-22
Synthetic Decision Support System Model Based on Data Warehouse and Tts Application
chen chao-xiang (institute of information technology; zhejiang shuren university; hangzhou zhejiang 310012; china)
..............
page:8-10
The Trojan horse concealment programmer based on DLL technology
yu jij-jiang the computer and information engineering department ; heze university; heze 274000; shandong; china
..............
page:47-49
A Study on the Technology and Skills of SSearch Engine
wang xi-yao taizhou technical college; taizhou zhejiang; 318000; china
..............
page:42-44
ying yong chang cheng wang luo huan yuan da shi you hua ji fang guan li
luo xin
..............
page:23-25
Design Distributed Application Program Based on .NET Platform
yan pei college of mathematics and computer science ; chongqing three gorges university; wanzhou; city 404000; china
..............
page:19-21
The Evolving of Legacy System
sun wei-jun guangdong university of technology guangdong guangzhou 510090
..............
page:80-82
yi zhong te shu de wang shang zheng quan jiao yi xi tong de gou jian
hu zhen
..............
page:74-77
soc wei dian zi ji shu de ying yong yu fa zhan
huang hao dong
..............
page:64-66
To Discuss the Project Management in University's Software Project Simply
guo yu-bin computer and communication engineering department; heze university; heze274015; shandong
..............
page:61-62
Application of Windows API Function Based on VB
lu shi-bin anhui university of science and technology ; huainan 232001; china
..............
page:56-58
tong guo bian cheng ba dbf biao zhong de shu ju dao ru dao sql server biao zhong
li guo qi
..............
page:10-13
The Application of the Data Mining Technology to the System of Intrusion Detection
liang zhi-rong
..............
page:5-7
ji yu web service de lian suo yao dian guan li xi tong de yan jiu yu she ji
zhou su juan ; tan ding ying
..............
page:1-2