Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2009 Issue 21
802.1x ren zheng ji shu ying yong ji fen xi
rong jian
..............page:5654-5655
A Relational Database Stored in the Random Tree Method
chen cui-song (guangdong vocational and technical college of electrical and mechanical; guangzhou 510515; china)
..............page:5607-5609
A research of Multiple Layer Architecture’s eHR system Base on .Net Platform
luo yun (public security marine police college; ningbo 315800; china)
..............page:5604-5605
The Application of GIS in Urban Disaster Emergency Response Management System
miao hui-yu (anhui economic information center; hefei 230001; china)
..............page:5612-5614
On the Storage Virtualization and Server Virtualization
zhao jian-hua; han zhi-hui (development college of jilin agricultural university; changchun 130600; china)
..............page:5606,5609
Operates the Excel documents using ASP.NET
liu wan-jun (computer department; yiyang vocational & technical college; yiyang 413049; china)
..............page:5602-5603,5617
Solution of Document Transmission System and OA System Interface
xu jian (anhui economic&information center technology department; hefei 230001; china)
..............page:5742-5744
ADO in ASP Application Research
ji song1; tian li-na1; liu qiang1; qi su-fang2 (1.china university of geosciences great wall college; baoding 071000; china; baoding branch of china unicom; baoding 071000; china)
..............page:5730-5732
The Virtual Experiment Design of Micro-program controller Based on VC++
hao shang-fu; wang zhi-hui; zhang zhi-qiang (computer science department of hebei north college; zhangjiakou 075000; china)
..............page:5725-5726,5729
Research Workflow System Based on Workflow Engine Shark
ruan zhi-bin (changsha social work college; changsha 410004; china)
..............page:5716-5717
Reasearch of Workflow-based Performance Evaluation Platform for Small and Medium Enterprises
lin yu-man (department of instruction technology; shaoguan university; shaoguan 512005; china)
..............page:5713-5714
Method of Generating the Cuteway View of Rib in the Software Inventor
liu ai-hua; du dong-ju (the submarine academy of navy; qingdao 266071; china)
..............page:5795-5796
Content-Based Image Retrieval Method
yang quan (longnan teachers college; longnan 742500; china)
..............page:5757-5759,5787
Introduction of the Machine Language
du yi-tong (guangdong finance institute; guangzhou 510445; china)
..............page:5755-5756,5762
ji yu wince de tong xun dao hang yi de ruan jian ji shu jia gou
ding wei ; su hong wei ; gan hao
..............page:5711-5712
xin xi ji shu yu shu xue jiao xue zheng he cun zai de wen ti yu dui ce
zhong xin juan ; lu guang di
..............page:5669-5670,5705
Computer Game Design Balance Strategy
lin luo-long (the overesas of chinese vocational school; guangzhou 510520; china)
..............page:5733-5734,5744
Research of Petri net model of basic Turing Machine
zhao dong-xu; yue xiao-bo (college of computer and communication engineering; changsha university of science and technology; changsha 410076; china)
..............page:5760-5762
The Researching of C# Handling Mechanism about Exception
yu shu-xiang (shazhou professional institute of technology; zhangjiagang 215600; china)
..............page:5745-5746
DCT and RLE Mixed Lossy Compression of Gray Image Based on Matlab
zhu ling-fang; liu ren-ren (colleges of information engineering; xiangtan university; xiangtan 411105; china)
..............page:5763-5765
Algorithm Improvement and Implementation of Using Smooth Groups to Generate Vertex Normals of 3DS Model
hu ping1; 2; lou xin-yuan2; chen gui-bin3; 4 (1. information science and technology college; southwest jiaotong university; chengdu 610031; china; 2. information technology in- stitute; sichuan agricultural university; yaan 625000; china; 3. sichuan university college of computer science; chengdu 61006; china; 4. sichuan aerospace vocational & technical college; guanghan 618300; china)
..............page:5770-5772
Application of Technique of Vertical Search Engine of Weave Based on Nutch
zhang bin; zhou er-ning (zhejiang yuexiu foreign language college; shaoxin 312000; china)
..............page:5785-5787
Detection Instrument for Floating Bricks of Floats the Law Glass Tin Trough Based on the Image Processing Technology
lou hui-qun (zhejiang institute of communications; hangzhou 311112; china)
..............page:5779-5780
Application of VBA Technology in Preparing Test Question in PowerPoint
zhao rong (school of information technology; hubei polytechnic institute; xiaogan 432000; china)
..............page:5723-5724
Research of the Integration of SSH Lightweight J2EE-based Framework
wang mei-qin (zhejiang tongji vocational college of science and technology; hangzhou 311231; china)
..............page:5718-5720
The Research of Photoshop in Digging Images Strategy Guide and Synthesizing Application for Creative Images
fang yue-sheng; yu qiang (anhui water conservancy technical college; hefei 231603; china)
..............page:5792-5794
Analysis on Wavelet Transform and Its Applications in Image Compression
liu guan-hai (central china normal university; wuhan 430079; china)
..............page:5776-5778
The Multimedia Computer-assisted Teaching of Understanding
huang jiang-hao; wang kang (hainan software profession institute; qionghai 571400; china)
..............page:5822-5824
The Application of Two Factor Theory in the Field of Modern Enterprise Management
cui li-mei (information and computer science department; qujing normal university; qujing 655011; china)
..............page:5790-5791
A Discussion on the Multimedia Courseware
li xue-min (the no.2 middle school of langfang city; langfang 065000; china)
..............page:5797-5798,5800
A New Method with Study Function Application in Temperature Compensation of Sensor
lu ya-dong; lin li-xin (information technology place ; kunming railway bureau; kunming 650011; china)
..............page:5799-5800
lonworks wang luo an quan fang fan ji shu yan jiu
liu qian
..............page:5634-5635
The Research and Design of Distributed Network Management and Reference Model
lin li-xin (jiangxi bluesky university of computer center; nanchan 330029; china)
..............page:5636-5637,5653
Study on High-level Web Standard: CSS Box Model
liang xiao-fang (zhuhai city polygenic; zhuhai 519090; china)
..............page:5638-5642
hui bian yu yan jiao xue ke jian
wang ping
..............page:5805-5808
jie du apr bing du
gao man zuo
..............page:5625-5626
Research of Move Learning Based on Move Blog
tang jian; guo li-juan (yiyang radio and television university; yiyang 413000; china)
..............page:5656-5658
Discusses in the Plane Design Shallowly the Visual Element
chen zhen-dong (jiangsu vocational college of finance and economics; huai an 223003; china)
..............page:5813-5814
qi ye erp shi shi cheng bai guan jian
lu zhi bin
..............page:5643-5644
MIB Browser Based on SNMP++
qin xiao-mei (henan economy and trade vocational college; zhengzhou 450053; china)
..............page:5688-5690
Using C# Transform the Desktop Wallpaper
chen jian-li (medical schools in sichuan province; chengdu 610100; china)
..............page:5709-5710,5722
Aligning Sentences in Bilingual Corpora Using Words and Positions
chen li-hong (guangdong chaozhou vestibule school; chaozhou 521000; china)
..............page:5591-5592
The Design and Realize of the Data Report System Based on PowerBuilder 10.5
liu hua-cheng1; liu hua-yun2 (1.chongqing three gorges college; chongqing 404000; china; 2.yu jia primary school in wanzhou; chongqing 404000; china)
..............page:5599-5601
Software Development Based on RUP
ding ying-chun (chaohu vocational and technical college; chaohu 238000; china)
..............page:5596-5598
The Analysis and Applications Base on DBMS Data Integrality of VFP
cao ying-huai (public security marine police academy; ningbo 315801; china)
..............page:5593-5595
The Algorithm with Image Data Compression of FFT
deng jia-bin; hu juan-li (zhongshan polytechnic; zhongshan 528404; china )
..............page:5766-5767
Research of Optimal Solution on Robust Graph Coloring Problem
kong ying (netease.com inc.; guangzhou 510665; china)
..............page:5773-5775
Based on Authorware Multimedia Courseware Development and Autorun CD-ROM Production Technology
zhu wei-feng; xu ya-mei (guangdong polytechnic college; guangzhou 510520; china)
..............page:5703-5705
Marketing Simulation Software Development
peng xiong-xin (zhaoqing technology vocational and technical college; zhaoqing 526020; china)
..............page:5740-5741
How to Implement the Auto R Email Feature Upon Employecs’ Absence
li zhao-ren (guangdong vocational school of polytechnic; guangzhou 510500; china)
..............page:5684-5685
On Hardware Configuration and Software Applications of Campus Network Construction
guo jian-rong (yan an cpc party school; yan an municipal school of administration; yan an 716000; china)
..............page:5673-5675
Course Reforming and Practice of Electronic Business in Higher Vocational
zheng qun (heyuan polytechnic; heyuan 517000; china)
..............page:5665-5666
Principle of the United Webpage Design
hua xiao-qing (department of information management and information system; renmin university of china; beijing 100872; china)
..............page:5627-5629
Analysis and Research on IPv6
ye xin (chizhou branch of housing provident fund management center; dongzhi 247000; china)
..............page:5696-5697
Batch Processing in the Computer Lab Management
fang sheng (bozhou teachers college; mengcheng 233500; china)
..............page:5622-5624,5626
On the Common Ways of Network Attacking and Preventive Measures
hong miao (liuzhou city vocational college; liuzhou 545005; china)
..............page:5678-5679
Summary of Telecommunications Management Network
zuo yan-li (henan vocational college of agriculture. master of software engineering; zhengzhou 451450; china)
..............page:5706-5708
The Realization and Application of Enterprise Remote Informational Management
zhao bing-xiu1; zhang yao2; tao jing3 (1.wuhan software vocational college wuhan; wuhan 430205; china; 2.school of electronic information; wuhan university; wuhan 430072; china; 3.information school; zhongnan university of economics and law; wuhan 430074; china)
..............page:5700-5702
Using IMAGE Control to Realize the Irregular Window in ACEESS
hu ling-li1; 2 (1.anhui university; computer science and technical institute; heifei 230039; china; 2.anhui vocational and technical college; infor- mation engineering department; heifei 230051; china)
..............page:5727-5729
Oven-controlled Double-push Plate System to Explore
zhou you-li (yiyang vocational & technical college; yiyang 413049; china)
..............page:5747-5748
The Discussion of Image Feature Extraction Based on Genetic Algorithm of Wavelet Neural Network
chu yao-jun (nanjing colloge of information technology; nanjing 210046; china)
..............page:5751-5754
Construction for the Storage System of Enterprise
li feng-ying (wuhan marine electric propulsion research institute; csic; wuhan 430064; china)
..............page:5632-5633,5642
shi tan shi jian jiao xue fang fa
liu li li ; zhu na
..............page:5981-5982
College Teaching Assembly Language Experimental Research
pan xue-feng; liu zhi-jun (department of computer; wuhan bioengineering institute; wuhan 430415; china)
..............page:5991-5992
shu ju wa jue zai gao xiao xue sheng xin li wen ti zhong de ying yong
li zuo ; zhang li shuo
..............page:5998-5999
On the Subnet Mask and Subnetting Method
li zi-xiao (department of computer science college lvliang; lvliang 033000; china)
..............page:5686-5687
ji yu fang dao men ji shu deng lu mo kuai de shi xian
ou zhi xian
..............page:5738-5739
Analysis of java Abstract Class and Interface
luo tao (hunan college of modern logistics; changsha 410131; china) abstract: in the java language
..............page:5735-5737
Analysis of Network Performance Measurement Techniques
liu jian-hua1; long zhang-yong2 (1.zhejiang business technology institute; ningbo 315012; china; 2.nanjing institute of rallway technology; nanjing 210015; china)
..............page:5682-5683
Table Division Technology Application in Business Tax Declaration
xu xiao-yan; zhang gui-zhu (school of information technology; jiangnan university; wuxi 214021; china)
..............page:5615-5617
The Combination of the Mysql Database in Linux and RADIUS Authentication
luo jin-wei (guangzhou pearl-river vocational college of technology; zengcheng 511300; china)
..............page:5610-5611,5614
Application Study of WLAN in the Future Ship borne Command and Control System
xu ling; long kun (bengbu navy petty officer school; bengbu 233012; china)
..............page:5693,5708
Research on Network Protection Technology and Security Gateway Based on Nat
gong xiao-hua (soochow securities co.; ltd; suzhou 215000; china)
..............page:5676-5677
Study and Realization of Network Clone Based on Pxe
tan xiao-dong1; chen zhen-qing2 (department of computer science and engineering of hezhou university; hezhou 542800; china)
..............page:5691-5692
Makes the Student Engine Room Maintenance to Work for Several Years Experience and the Experience
zheng yu-zhu (computer center ; foundation medical school; guiyang medical college; guiyang 550004 ; china)
..............page:5667-5668
Palmtop Computer System Plan Design of Engineering Equipment Support
wu hai-peng (engineering institute of engineering crops; pla univ. of sci. & tech.; nanjing 210007; china)
..............page:5661-5662
ji yu bp wang luo de gu shi yu ce mo xing she ji
peng jiang
..............page:5715,5732
Change of Direction in Complexity Based on the Environment of Web 2.0 to Set the Management of Personal Knowledge as an Example
peng li1; wan ping2 (1.xinyu college; xinyu 338000; china; 2.yifu primary school of xinyu; xinyu 338000; china)
..............page:5649-5651
Computer Virus Analysis and Guard
wu hau-zhang (dongguan institute of technology; dongguan 523808; china)
..............page:5937-5938
Hybrid Genetic Algorithm Based on Fall Free Algorithm
ma yu-ling (school of computer science; shandong yingcai university; jinan 250100; china)
..............page:5783-5784
A Distributed LED Showing System Based on RS-485 Bus
peng jun (guangzhou sunneo biometrics co.; ltd; guangzhou 510000; china)
..............page:5801-5802
Analysis of Computer-aided Teaching in Multimedia Applications
xu hui-jie (jinzhou municipal party committee party school local development department; jinzhou 121003; china)
..............page:5835-5837
qian xi c2c zai xian jiao yi he tong de yao yue yu cheng nuo
hu xing yan
..............page:5871-5872
Application of an Improved Genetic Algorithm in Intrusion Detection
zhan long-ying (wuxi teachers college; wuxi 214187; china)
..............page:5788-5789
Exploration and Thinking of Computer Fundamental Course for Adult Non-computer Majors
long da-ya (computer and mathematic room of north sichuan medical college; nanchong 637000; china)
..............page:5989-5990
Demand Analysis of Universal Full-text Searching System
mo fu (dongguan nanbo polytechnic; dongguan 523083; china)
..............page:5781-5782
On the Integrated Platform of E-government Solutions
xie qing-zhong1; chen xue-mei2 (1.guangzhou kingteller technology co.; ltd.; guangzhou 510640; china; 2.guangzhou institute of technology; guangzhou 510075; china)
..............page:5694-5695,5702
Comparative Study on Feature Extraction in Large-scale Text Categorization
he hai-bin; si jian-hui (college of mathematics and computer science; hebei university; baoding 071002; china)
..............page:5768-5769,5775
Exploration on Communication Principles Practical Teaching
qu xia; ma dong-mei (school of information science and engineering; jiangsu polytechnic university; changzhou 213164; china)
..............page:5803-5804,5808
tui xing cheng shi gui hua dian zi bao pi de ruo gan si kao yu shi jian
zhang cai zuo
..............page:5809-5810,5812
Coping Strategies of National Computer Rank Examination about Public Backgroundelementary Knowledge for Grade 2
sun hui-jun (department of computer sciences; yunyang teacher s college; danjiangkou 442700; china)
..............page:5833-5834,5843
ji yu ch374 de usb zhu ji kong zhi qi she ji
wang wei
..............page:5941-5942
Originating Practice Group Based on Projects and Enhance Comprehensive Ability of Students
gan xing-xun (college of educational information and technology; hubei normal university; huangshi 435002; china)
..............page:5817-5818,5821
dui wang luo she bei ying jian fang hu de jian yi
xie su li ; xie gui qing
..............page:5945-5946
The Excel Apply in Job Mangement
zhang li-ying1; yi yan2 (1.yunnan physical science and sports professional; kunming 650228; china; 2.kunming college; kunming 650031; china)
..............page:5844
Research of Video Phone Terminal Based on Trimedia Platform
zhao hai-tao; cai wan-jing (department of computer science; sias college of zhengzhou university; xinzheng 455150; china)
..............page:5953-5955
Cloud Computing on the cause of the Weather Outlook
hu ying (zhoukou meteorological office; zhoukou 466002; china)
..............page:5876-5879
Research on ip-iq Detection Algorithm and Simulink Detection Algorithm
jiang xiang-hui (liuzhou vocational & technical college; liuzhou 545006; china)
..............page:5885-5886
Improve the Image Acquisition of Academic Certificate Based on VFP
xu cai-feng (luoding radio and tv university; luoding 527200; china)
..............page:5947-5948,5951
ji suan ji wang luo an quan yin huan yu fang fan tan tao
li chun yu
..............page:5887-5888,5891
Research and Design on S3C2410X Ethernet Interface
liu gui-hong1; li guang-lin2; zhao yuan2 (1. engineering college of the chinese people s armed police force; xi an 710086; china; 2.engineering college of the chinese people s armed police force; xi an 710086; china)
..............page:5889-5891
gou jian dian shi tai ju yu wang de an quan fang hu ti xi
wang hai tao
..............page:5899,5909
Computer Network Security and Protective Strategy
du lin1; li shi-yun2 (1.rizhao border defense crew; rizhao 276826; china; 2. rizhao industrial school; rizhao 276826; china)
..............page:5671-5672,5675
The Reasearch of CAI Course Software Evaluation
liu wei; mo jian-ping (liuzhou teachers college; liuzhou 545004; china)
..............page:5983-5984,5994
University "Computer Civilization Foundation" Educational Reform
wu hau-zhang; chen zi-fa (dongguan institute of technology; dongguan 523808; china)
..............page:5993-5994
Investigation and Practice on Online Interactive Teaching Mode
niu hai-lin1; ma zhong2; qiao you-ming1; lu su-jing1 (1. department of biological sciences; qinghai university; xining 810016; china; 2. department of computer; qinghai university; xin- ing 810016; china)
..............page:5979-5980
qian tan guan yu ru he wei hu jiao xue wang ye de fang fa he cuo shi
zhang ming juan
..............page:6015-6016
Optimize Vocational Computer Classroom Teaching Strategy
gao xiang-bo (hunan qiyang studying normal secondary specialized school; qiyang 426100; china)
..............page:5815-5816
Based on .NET Data Storage and Transmission Mechanism Research
cai xue-lian (guangdong trade and industry vocational technical college; guangzhou 510510; china)
..............page:6031-6033
The Examination Records Analysis and Application of JWGLXTNET
xu cai-feng (luoding radio and tv university; luoding 527200; china)
..............page:6009-6011
Large-Screen Splicing Technology and Its Applications
lu guang-yi (xiamen huaxia vocational college; xiamei 361024; china)
..............page:5827-5829
Use Winsock Control to Design UDP Program
xu lan-lan (department of information technology teaching; guangzhou financial vocational school; guangzhou 510515; china)
..............page:5721-5722
A Method of "class module" to Achieve Based on the VB Database Access Technology
liu xing-ming (department of computer science college lvliang; lvliang 033000; china)
..............page:5831-5832
A Discussion on the "University of the Computer Basic Course" Teaching in Non-computer Specialty
liu xin (jilin insitute of architecture and civil engineering; jilin 130011; china)
..............page:5830,5837
The Application Research Based on Iris Recognition
chen liu-wei (the aviation university of air force; flight basis training base; changchu 130001; china)
..............page:5749-5750
Knowledge Discovery Based on Grid
zhang li-fang (changsha aviation vocational technology college; changsha 410014; china)
..............page:5958-5960
ji yu qu yu de gao zhi wang luo ji shu pin pai zhuan ye jian she xin tan suo
liu zhao bin ; xu xin wei ; li jin xiang
..............page:5987-5988
dian zi you jian shou fa xi tong de yan jiu yu she ji
hu qiao ling ; wang yan jie
..............page:6044-6045
Research of the FAT Storage Structure Theory
li liang; wang shao-guo (changsha nanfang vocational college; changsha 410208; china)
..............page:6048-6049
vb.net zhong dui excel de er ci kai fa
qin hu feng ; sun wei ; tang yong fen
..............page:6056-6057
Timing-driven FPGA-based State Machine Principle of Look-up Table
feng ou (hunan science and technology vocational college; school of information engineering; xiangtan 411104; china)
..............page:6038-6039
Ontology Model in Object-oriented Application of the Reasoning
zhu lin (computer technology and application department; qinghai university; xining 810016; china)
..............page:5956-5957
c# de wen jian chu li yan jiu yu shi li fen xi
he wei ; chen yong qiang
..............page:6046-6047
Realization Research on SSO based on Javascript Wormhole Technology
zeng jie-qiong1; zhong hui-yun2 (1.school of mechanical & automotive engineering; scut; guangzhou 510640; china; 2.guangzhou ruual credit union; guangzhou 510623; china)
..............page:6070-6071
ji yu gis de bai sha guan qu guan li xin xi xi tong kai fa
zhang cheng cai ; ye wei ; chang jing
..............page:6054-6055,6059
The Security Solution of on-line Securities Information System Based on PKI
yang tong1; 2 (1.institute of network security; shandong university; jinan 251000; china; 2.shandong economic management personnel institute; jinan 250014; china)
..............page:6064-6065
kai fa qu ban gong zi dong hua xi tong de she ji yu shi xian
yin cheng liang
..............page:6066-6067
Analysis and Improvement of a Secure Key Distribution Protocol on SPWMN
liu yan-xia; zhao zong-qu (college of computer science and technology; henan polytechnic university; jiaozuo 454000; china)
..............page:5907-5909
vb guo cheng diao yong de can shu chuan di wen ti
song jun rong ; gu qiu zuo ; ma li fang
..............page:6060-6061,6080
The Adaptation and Development of Meteorological Television Program by Digital Medium
hou ya-hong; wang qian (liaoning meteorological video center; shenyang 110016; china)
..............page:5819-5821
The Bayesian Rough Set Based Approach for Image Classification
li yan-rong (school of computer; shenyang institute of chemical technology; shenyang 110142; china)
..............page:6076-6080
ji yu web de duan xin ping tai de she ji yu shi xian
guan ze ang
..............page:6042-6043
Campus Network Management and Optimization
huang xue-wen (huizhou technical school; huizhou 516003; china)
..............page:5680-5681
On-line Banking System Based on SSH Frame and Correlation Technique Research
miao yong; wang jian; sun you-cai (department of computer; yangzhou vocational college of environment and resources; yangzhou 225127; china)
..............page:5645-5648,5651
ji suan ji wang luo an quan wen ti po xi
yu wei
..............page:5663-5664,5668
Research of Portal Personlization
liu ying; cai wan-jing (computer science department of sias international university of zhengzhou university; xinzheng 451150; china)
..............page:6052-6053
ji yu fpga de zhi jie shu zi pin lv he cheng ji shu yan jiu
liang ning li ; wu yi qiang
..............page:5893-5894
mosfet de qu dong ji xi shou dian lu
zhang wen jia ; zhong hai feng ; wang jian bin
..............page:5922,5940
Trouble Eliminating Analysis and Testing Process of General TCP/IP Interconnecting Network
du wei; lou hua (dept. of computer; changzhou college of information technology; changzhou 213164; china)
..............page:5856-5857
How to Design High Performance Network Insulate System
feng xu (liuzhou city vocational college; liuzhou 545002; china)
..............page:5860-5862
Reduction Algorithm Based on the Association Rules
zhang zhe; zhang tao (nanyang normal university; software school; nanyang 473061; china)
..............page:6068-6069
jin rong zhong jian ye wu xi tong gu zhang fen xi chu li
zhang yan yu
..............page:6074-6075
da xing dian chu chen qi de cfd mo ni ji you hua she ji
jiang xiao fang ; cao xi jing ; si zhen peng
..............page:5883-5884
Exploration and Discussion of Higher Vocational Institute of Technology’s Laboratory of Computer Management
jiang gui-wen (guangxi technological college of machinery and electricity; nanning 530007; china)
..............page:5825-5826
word zai xin xi hua jiao yu zhong de ying yong yan jiu
sun zhi mei
..............page:6006-6007
ji yu dian zi shang wu ying yong de web shu ju wa jue ji shu yan jiu
lu jun ; sun yong hong
..............page:5901-5902
yi dong ip xi tong zhong de tcp xie yi you hua yan jiu
yang lei
..............page:5917-5918
gou jian wang luo cao zuo xi tong yi ti hua jiao xue huan jing
zhuang li ; ju li feng
..............page:6012,6016
ssl vpn de xiang guan jie shao yu an quan xing yan jiu
deng ming
..............page:5855,5857
Research on Information Monitoring Methods Based on Windows Operating System
zhang jun-rui; chen xiao-jia; zeng dong-mei (zhuhai prefecture branch; china telecom zhuhai 519002 china)
..............page:5840-5843
The Discussion for the Course System Design of Computer Application Profession Facing the Working Process
zhai yan-hua (henan mechanical and electronical school; zhengzhou 450002; china)
..............page:5845-5846
Research of NAT Traversal Scheme based UDP in P2P Communication
lu qi-fang; fu guang-xuan
..............page:5903-5904
xu ni xian shi zai ji qi ren fang zhen zhong de ying yong
hao jia quan ; zhou xiao guang ; zhuang yu feng
..............page:5865-5866
Ajax Application Security Risk Analysis and Prevention
zhu xi-rui (zhejiang shuren university; information technology institute; hangzhou 310015; china)
..............page:6072-6073
ajax ji shu zai asp.net zhong de ying yong
ye yuan hua
..............page:5920-5921,5938
qian tan ji suan ji de cun chu she bei
xu sen qin
..............page:5916,5918
Computer Room Environment Protection and Safety Management
tang yuan-ming; zhao wei (liaoning meteorological information & technological support center; shenyang 110016; china)
..............page:5659-5660,5662
Design of Single-Chip Microcontroller Application System Based on Proteus
he yong (college of computer science & information; guizhou university; guiyang 550025; china)
..............page:5880-5882
bei ye si wang luo
han lei ; wu shu fang ; wang zi xian
..............page:5867,5872
shu zi yin pin qian ru yu jie qian ji shu de yan jiu yu ying yong
sun yong hong ; lu jun
..............page:6024-6025,6027
The Application of Mold Splitting on PRO/E
chen chan-juan (chenzhou vocational & technical college; chenzhou 423000; china)
..............page:6028-6030
The Comparison Between Internet Storage Techniques
meng ling-fu (information department; shandong polytechnic vocational college; yanzhou 272105; china)
..............page:5910
lun dian zi shang wu xin xi bu dui cheng
ren min
..............page:5911,5915

..............page:5900
zhong guo de shu zi hua zheng fu zhi lu
peng rong
..............page:5923-5924
Sequoia Heterogeneous Database Clustering Middleware
wang fang-li (guangzhou auto college; south china university of technology; department of computer engineering; guangzhou 510800; china)
..............page:5932-5934
yi dong zi zu wang de yan jiu he tan suo
huang feng ling
..............page:5863-5864
ju yu wang arp qi pian gong ji ji qi fang yu cuo shi yan jiu
wang jia zuo
..............page:5939-5940
chu tan ji yu gong zuo guo cheng san wei dong hua jiao xue fang fa
a bu lai ti yu su fu ; ha nu mu zu nong
..............page:5966-5968
Application of DNS Link Load Balance of Dual-link Access in Campus Network
zhang wei (information & network center; xuzhou 221116; china)
..............page:5949-5951
qian yi dian xin hu lian wang de an quan ti xi
wang xin ying
..............page:5943-5944
lun wang luo liu mei ti ji shu
li fang
..............page:6017-6018
xiao bo shen jing wang luo zai ran qi fu he yu ce zhong de ying yong yan jiu
wang wei ; cui qing min
..............page:5930-5931
ru he gai shan xiao yuan wang de xing neng
li zhi quan
..............page:5897-5898
The Model Building of a Distributed Intrusion Detection Based on Mobile Agents
shi jun-yan; wang shu-min (xuchang vocational technical college; xuchang 461000; china)
..............page:5925-5927
Design and Realization of J2EE-based Multi-media Equipment Management System
zeng yu; qiu ai-yi (jiaying college of medicine: network multimedia room; meizhou 514031; china)
..............page:6026-6027
Edge Detect Based on Sobel
bai jun-jiang; hong chun-yong (nanchang university; nanchang 301123; china)
..............page:5847-5849
An Analysis of the Failure Rate of Telcom Network Topology
chen hua1; 2 (1. southeast university; nanjing 210096; china; 2. ningbo branch of china unicom network communications co.; ltd. ningbo 315000; china)
..............page:5850-5851
wei qin xun lian bao zhang guan li xi tong de kai fa
qi hong jun
..............page:6058-6059
Design of Enterprise Decision Support System Based on Data Warehouse
dong qin (yancheng institute of technology; yancheng 224000; china)
..............page:6034-6035,6075
qian tan ji suan ji wang luo an quan
hao li ping
..............page:5868-5870
The Virtual Machine’s Superiority of Using for Computer Teaching
luan yong (department of information engineering; anhui industry polytechnic; tongling 244000; china)
..............page:5985-5986
The Research of Entrap Worm Virus Based on The Intrusion Detection System
zeng zhi-jun; tang wen-sheng; yin dan (computer education department; hunan normal university; changsha 410081; china)
..............page:5961-5963
The Application of School Information Platform on Grid
zhang zhong-qing (liuzhou no.40 middle school; liuzhou 545002; china)
..............page:5964-5965
jian gou zhu yi li lun zhi dao xia de ji suan ji jiao xue yan jiu
yu zuo ping ; zhang ying ; liu fang
..............page:5838-5839
The Study of Personal Server Based on DDNS and VMWare
bao jing-hai (department of physics and electronic engineering; qinzhou university; qinzhou 535000; china)
..............page:5620-5621
Content-Based Image Retrieval
lv yuan-hua; jia shi-jie; guo yu-ming (dalian jiaotong university; dalian 116028; china)
..............page:5905-5906
zou jin web2.0
wu hong xia
..............page:5935-5936
vpn ji shu zai qi ye wang luo zhong de yun yong
zhou xiang
..............page:5952,5963
The Exploration of the Application of Task-based learning Approach in Computer-based Teaching
song li; wu yu-hua; cai li-yan (mudanjiang teachers college department of computer science and technology; mudanjiang 157012; china)
..............page:6002-6003
ji yu web de wang shang jiao xue xi tong de she ji
a bu li mi ti ai er xi ding ; a bu lai ti ji li li
..............page:5969-5970,5972
gao deng xue xiao ji suan ji jiao xue gai ge tan suo
a bu lai ti ji li li
..............page:5971-5972
College of Computer-Based Teaching Reform
shen xiang-yun; qian ying; li qi-fang (yunnan university of finance and economics; kunming 650221; china)
..............page:6004-6005