Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Knowledge and Technology
1009-3044
2005 Issue 8
The All-Newly Network Safety Strategy
WANG Shu-li;NU Li
..............
page:24-26
Obstacles of Shared Resource in Local Area Network and Obviation
LIU Xiu-feng;MAO Li-hong
..............
page:21-24
jie he yi xue tong ji xue shang hao visual basic cheng xu she ji ke
chen yong qing
..............
page:19-21
A Superfical Analysis about Clustering Used in Data Minin
ZHANG Xiao-wei;YANG Yu-biao
..............
page:17-18
word zhong li yong vba shi xian shu ju ku shu ju de tao da
liu liang
..............
page:15-16
pi liang shu ju chu li xi tong de she ji yu shi xian
li dong
..............
page:12-14
sql server shu ju ku bei fen he huan yuan de fang fa
li chun juan ; sun xiang chun
..............
page:10-11
shu ju cang ku yu shu ju wa jue qian xi
wang xiao yan ; tan ying jun
..............
page:8-9
zai vb6.0 zhong cai yong ding dian hua xian de fang fa da yin biao ge
wei wen sheng ; zhou lin
..............
page:6-7
dui ado.net zhong datareader dui xiang de tan tao
hu zhen
..............
page:3-6
authorware yu hou tai shu ju ku de jie he
shen wei hua
..............
page:1-3
Research Studing in the Condition of Internet
ZHANG Xiao-Wei;JIANG xia
..............
page:94-96
The Design And Practice Of Teaching-Mode Based On Network Resource
KUANG Cui-shan
..............
page:92-94
Practice and Probing on Teaching Reform of Elementary College Computer Knowledge
XU Jing;DU Jian-hua
..............
page:90-92
gao xiao wang luo jiao yu de xi tong gui hua yu jian she
li lian ying
..............
page:88-89
Information of University's Teaching materials Management System
WANG Ming-an;FENG Shuo
..............
page:86-88
qi fa ji qing , zeng qiang dong shou neng li shi ji xiao ji suan ji jiao xue de guan jian
li jie lai
..............
page:84-86
ji suan ji ji shu de fa zhan dui she hui de fu mian ying xiang
liu jian hua
..............
page:82-84
Frame and realizing of Select the lesson system on the net based on COM+
ZENG Jian-hua;LI Bin
..............
page:80-81
Reflections On the Construction of Information Resources In Higher-education Schools
LI Jian;DU Jian-hua
..............
page:78-80
mian xiang dui xiang de xian dai wu liu guan kong diao du ruan jian kai fa
ma guo qin ; gao feng
..............
page:76-78
qian tan wang luo yin xing de fa zhan
chen ying
..............
page:74-75
qiao yong timer ji shi qi kong jian zhi zuo dong hua
luo hui yan
..............
page:72-74
ji yu vb.net ping tai de zi dong gai juan she ji tan tao
li yu xia
..............
page:71-72
hun he xing yi qun suan fa ji qi ying yong yan jiu
xu liang hai ; ni zhi wei ; lai da rong
..............
page:68-70
shen fen ren zheng fang an de fen xi yu she ji
wang xiao yan
..............
page:66-68
yong powerpoint xp zhi zuo jiao hu lei ke jian
lian rui mei
..............
page:64-66
The Re-Developing of System of Auto-programme of Curriculum Timetable
HUANG Fu-xian
..............
page:61-64
rao guo windows 2000 ipsec guo lv ji zhi
sun si liang ; sun li hua
..............
page:59-61
pc ji shu zhong hui bian yu yan de dui ce
wang dong lei ; liu lei
..............
page:56-59
guan yu gou jian ji shu yu zhong jian jian guan xi de tan tao
he zong mei ; tang yi zuo
..............
page:54-56
ru he wan shan wo guo dian zi shang wu zheng ce fa lv huan jing
cao xiao li ; sun jie
..............
page:52-54
he cheng (composite) mo shi ji zai range chu li zhong de ying yong
ni ye qing
..............
page:50-52
yi yuan bing an guan li xin xi hua yan jiu
zhou zhao gang
..............
page:48-50
.net ping tai xia cheng xu ji de bu shu fang shi
liu qing hu ; zhang feng ; liu peng jun
..............
page:46-48
ji yu windows2000 xia jiu ji qi ju yu wang zu jian jie jue fang an
zhang hua nan
..............
page:44-45
lue lun web ying yong de ti xi jie gou ji qi shi xian
zuo yun
..............
page:41-44
Reseach on Network Security
ZHOU Jin-hua
..............
page:38-41
lp zu bo ji shu zai shi pin chuan shu zhong de ying yong
zhang yi jun
..............
page:36-38
ji suan ji wang luo de an quan fen xi yu dui ce
zhang hua gui ; wang hai yan
..............
page:34-36
ji yu easerver de fen bu shi duo ceng mo xing yan jiu
zhou shu feng ; han hong yan
..............
page:31-34
Research of Security Problem of the Network Information
TANG Yi-tao
..............
page:29-31
ru he gai shan xiao yuan wang wang su tan
chen jin bin
..............
page:26-28