Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2005 Issue 8
The All-Newly Network Safety Strategy
WANG Shu-li;NU Li
..............page:24-26
Obstacles of Shared Resource in Local Area Network and Obviation
LIU Xiu-feng;MAO Li-hong
..............page:21-24
A Superfical Analysis about Clustering Used in Data Minin
ZHANG Xiao-wei;YANG Yu-biao
..............page:17-18
sql server shu ju ku bei fen he huan yuan de fang fa
li chun juan ; sun xiang chun
..............page:10-11
shu ju cang ku yu shu ju wa jue qian xi
wang xiao yan ; tan ying jun
..............page:8-9
zai vb6.0 zhong cai yong ding dian hua xian de fang fa da yin biao ge
wei wen sheng ; zhou lin
..............page:6-7
authorware yu hou tai shu ju ku de jie he
shen wei hua
..............page:1-3
Research Studing in the Condition of Internet
ZHANG Xiao-Wei;JIANG xia
..............page:94-96
gao xiao wang luo jiao yu de xi tong gui hua yu jian she
li lian ying
..............page:88-89
Information of University's Teaching materials Management System
WANG Ming-an;FENG Shuo
..............page:86-88
Frame and realizing of Select the lesson system on the net based on COM+
ZENG Jian-hua;LI Bin
..............page:80-81
qian tan wang luo yin xing de fa zhan
chen ying
..............page:74-75
qiao yong timer ji shi qi kong jian zhi zuo dong hua
luo hui yan
..............page:72-74
hun he xing yi qun suan fa ji qi ying yong yan jiu
xu liang hai ; ni zhi wei ; lai da rong
..............page:68-70
shen fen ren zheng fang an de fen xi yu she ji
wang xiao yan
..............page:66-68
yong powerpoint xp zhi zuo jiao hu lei ke jian
lian rui mei
..............page:64-66
rao guo windows 2000 ipsec guo lv ji zhi
sun si liang ; sun li hua
..............page:59-61
pc ji shu zhong hui bian yu yan de dui ce
wang dong lei ; liu lei
..............page:56-59
guan yu gou jian ji shu yu zhong jian jian guan xi de tan tao
he zong mei ; tang yi zuo
..............page:54-56
ru he wan shan wo guo dian zi shang wu zheng ce fa lv huan jing
cao xiao li ; sun jie
..............page:52-54
yi yuan bing an guan li xin xi hua yan jiu
zhou zhao gang
..............page:48-50
.net ping tai xia cheng xu ji de bu shu fang shi
liu qing hu ; zhang feng ; liu peng jun
..............page:46-48
Reseach on Network Security
ZHOU Jin-hua
..............page:38-41
lp zu bo ji shu zai shi pin chuan shu zhong de ying yong
zhang yi jun
..............page:36-38
ji suan ji wang luo de an quan fen xi yu dui ce
zhang hua gui ; wang hai yan
..............page:34-36
ji yu easerver de fen bu shi duo ceng mo xing yan jiu
zhou shu feng ; han hong yan
..............page:31-34
Research of Security Problem of the Network Information
TANG Yi-tao
..............page:29-31
ru he gai shan xiao yuan wang wang su tan
chen jin bin
..............page:26-28