Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2005 Issue 29
zai delphi zhong ru he shi shu ju ku he treeview jian li lian jie
wei guo zhen ; gong lei
..............page:7-9
ji suan ji ru chong bing du de jie xi yu fang fan
yang jun
..............page:32-34
The Research and Implementation of Business-end Service Composition System
jia jun(the center of information and technology of taian postoffice shandong province; taian 271000; china)
..............page:34-37
Using API function to fill in areas in VB
wang fan(information engineering college; capital normal university; beijing 100037; china)
..............page:59-60
How to build secure system of campus network
wu yu-xiu(liuzhou transport vocational technical college; liuzhou 545007; china)
..............page:25-27
qian xi shu zi hua dang an xin xi an quan wen ti
lu guang neng
..............page:30-32
The construct of information safety protection system for power supply company
yang liu(shizuishan power supply bureau; shizuishan 753000; china)
..............page:42-44
jian lun mian xiang agent ruan jian gong cheng fang fa
fang zheng yang
..............page:82-83
Informationlized Construction of college Campus
li jie(sichuan judicial and police officers professional college; deyang 618000; china)
..............page:83-84
xiao bo bian huan zai tu xiang ya suo zhong de ying yong
hou zheng chang
..............page:75-77
The Design And Application Of the Customs Inspection Controlling System on Export Processing Zone
wei hui-feng1; shen jie2(1.lianyungang economic and technological development zone; lianyungang 222047; china; 2.lianyungang international exhibition center; lianyungang 222042; china)
..............page:80-82
Component-Based Security Strategy for Web-Based Management Information System
zhao jie(school of industry and business management; anhui university; hefei 230039; china)
..............page:3-5
Comparison Analyses on Active Web Pages Technologies Such as ASP、PHP and JSP
fan yun-zhi(department of computer science; shangqiu normal university; shanqiu 476000; china)
..............page:19-21
The analysis of campus net faces the IPV6 transition from the IPV4
wu li-zheng (dept. of computer science; jiangyin polytechnic college ; jiangyin 214433; china)
..............page:28-30
Application of GSM Technology in the Communication Management System
fang geng(nanjing university of aeronautics and astronautics; nanjing 210016; china)
..............page:1-2
The Generation of Pseudo-random Numbers and Application in Computer Cryptography Security
wang rui-hu(dept.of mathematics & computer science; chongqing university of arts and sciences; yongchuan 402160; china)
..............page:21-22
ji suan ji bing du
wang shu yan
..............page:44-46
Self-definition Product Model Application in Insurance System
wu ting-ting; liu yi(school of software engineering university of science and technology of china; hefei 230026; china)
..............page:49-51
Defect of Access Report in Office Automation and its Solution
zhu yun(xi an aero-engine (group) polytechnic institute; xi an 710021; china)
..............page:64-65
Available methods of inputting long number quickly
wang hong(department of computer science and technology ; huangshan university; huangshan 245021; china)
..............page:67-68
The Research of Data Warehouse Technology
xu yong-liang(.depart. of information & employment technology jiangsu college; wuxi 214101; china)
..............page:9-11
li yong xmlhttp ji shu jin xing zi yuan zheng he de yan jiu yu shi xian
gu zheng gang ; bi hai feng
..............page:12-14
Thinking about Electronic Payment Problems
li yan1; wu min-jie2; liu jian-feng3(1.computer department; nanjing institute of technology; nanjing 210013; china; 2.department of economic and trade; nanjing university of information science and technology; nanjing 210044; china; 3.nanjing newland company; nanjing 210029; china)
..............page:56-59
A Study of General Structure and of Business Support System and Its Realization
cao lei(shanghai ruoya software system ltd.; shanghai 200127; china)
..............page:77-80
Analysis Of Wireless LAN Security Designs
shi chuang-ming (department of computer and science; anyang teacher s college; anyang 455000; china)
..............page:23-25
wang luo chang jian gong ji fang fa
wei zuo
..............page:46-47
The computer virus is endangered and protects
wang li-hong(the seventh hospital of shijiazhuang; shijiazhuang 050031; china)
..............page:48-49
The Application of MD5 to Remove the Repeated Pages
peng shu-rong1 2; zhang jing2; yang wen-zhong2(1.college of electric and information engineering of changsha university of science and technology; changsha 410075; china; 2.college of electric and information engineering of hunan university; changsha 410082; china)
..............page:15-16
A Superficial Discussion Of Safety Problem Of ASP and Its Countermeasure
xu shuo-na(department of computer; nanhai school; south china normal university; foshan 528225; china)
..............page:17-19
Several Issues and Skills In Porting μC/OS-II
liao chuan-shu; li hui (information engineering institute; wu han university of technology. wuhan 430070; china)
..............page:61-62
qian tan wang luo jiao xue fu zhu ping tai de jian she
zuo hai ning
..............page:92-94
shu ju wa jue de chang yong fen xi fang fa yu suan fa yan jiu
peng guang chuan ; li ying
..............page:5-7
Visit at the beginning when the simple game based on VB is developed--Design of a game of Huarong
wang xue-ling; wang cheng-xiang(electronic information engineering institute of tongji university; shanghai 200092; china)
..............page:51-54
technique document in students' graduate design
luo sheng-min(qingyuan occupation technical college; qingyuan 511500; china)
..............page:73-75
dian zi ji shu jiao xue gai ge si kao
shi hui
..............page:90-92
Windows XP Is Shut Down Automatically
guo yang(tang shan teacher s university; tangshan 063000; china)
..............page:71-72
qian tan zheng quan jiao yi ruan jian zhong de jiao yi zhong jian jian
bao xiao dong ; sun bao ni ; li li
..............page:63
ru he zai win2000 he winxp li an zhuang win98
sun bao ni ; bao xiao dong
..............page:55-56
The instance of configing the Virtual Local Area Network
bai xiang-fang; cheng pi-kun(the yongcheng professional college; yongcheng 476600; china)
..............page:39-42
A Platform for E-learning Service Based on Domain Course Knowledge Repository
wang hui(yangzhou taxation institute of the state administration for taxation; yangzhou 225007; china)
..............page:85-87
cai ke jian zai ying yu ke tang jiao xue zhong de yun yong
li wen fei ; guo jin yu
..............page:89-90
.net xia ji yu com zu jian de c# yu matlab hun he bian cheng
you feng ; chen zuo
..............page:65-67