Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2010 Issue 36
Design of Network Teaching System Based on ASP Technology
TAN Song-he;QIN Qi
..............page:10199-10200
ji suan ji wang luo ke cheng gai ge yu shi jian
zuo hai juan
..............page:10362-10363
Development of the Time Display Control with VB and Its Application in PowerPoint
DU Chun-wen;YU Ming-li
..............page:10335-10336
Virtual Private Network Based on Active Network Architecture
LING Bao-hui;LEI Yan
..............page:10254-10255
shu ju ku suo yin ji shu de ying yong
deng ti jun
..............page:10212-10214
Design of the Encoding/Decoding Model of RFID Reader Based on Singlechip
LIU Jun-jun;LIU Chen
..............page:10416-10417,10423
Analysis of the Premises Distribution System
ZHAO Jie
..............page:10274-10276
Network Security Technology and Its Application in the Campus Network
GAO Chuan-yu
..............page:10244-10245,10251
Talk the Application of Application and Session Object
HUANG Xiao-hua
..............page:10297-10298
How Completes Suits the Classroom Application the Multimedia Coursewares
SUN Dong-yan1;PAN Chun-xiang2
..............page:10398-10399,10403
On the Computer-Based Teaching Reform
SUN Juan
..............page:10355-10356
Image Compression and MATLAB Simulation
QIAO Qi;XU Tong
..............page:10396-10397
On the Computer Information Security
SHAO Guang-ming
..............page:10264-10266
A License Plate Fusion Recognition Algorithm Based On Wavelet Neural Networks
WU Mao-gang1;2;PAN Yong-hui1;2
..............page:10304-10306
An Improved RED Algorithm Based on Two-Level Linear Smoothing
ZENG Guang-qing
..............page:10332-10334
The VLAN Technology and the VLAN Application in LAN
ZHOU Hong
..............page:10272-10273
qian tan xue xiao ji fang ju yu wang de zu jian guan li yu wei hu
wang guo jiao
..............page:10346,10351
Survey of Ant Colony Combination Clustering Algorithms
LIANG Dong;XING Jie-qing
..............page:10320-10321,10324
Excel Solves Program Problems Skilfully
LI Yue-qiang
..............page:10299-10300,10303
The Campus Network Security Based on the Technology of VPN
LI Pan-rong1;2;MAO Wan-nian1;2
..............page:10281-10283,10285
The Research and Design of Military Domain Ontology Library
LI Kun1;HAN Zhi-qiang2;LIU Peng3;YANG Xiao-bo1
..............page:10196-10198
gao zhi gao deng shu xue duo mei ti jiao xue de tan tao
shen chuan jin
..............page:10402-10403
dian zi shang wu xu ni zhu ji xi tong de yan jiu yu shi xian
zhu jian xin yang li ping
..............page:10230-10232
OSTU Algorithm on the Smart Car Track’s Application
GONG Zi-zia;SHAO Ming-gang
..............page:10369-10370
jian zhu lei gao zhi cad ke cheng jiao xue tan tao
chen su ling
..............page:10350-10351
qian tan ji suan ji wang luo an quan lou dong ji dui ce
geng zhong hua
..............page:10288-10289
guang bo dian tai dian hua guang bo jian she tan tao
wang chao
..............page:10387-10388
ji yu uml de xiao yuan dian zi shang wu ping tai de fen xi yu she ji
wu zhi nan qi zuo liu zuo na huang wei fan
..............page:10226-10227
ju yu wang wang luo wei hu he guan li cuo shi
xu dong hui
..............page:10291-10292
ji yu shi shi deng zhi mian de ti shu ju diao ke
huang run qin
..............page:10379-10382,10388
ji suan ji cheng xu she ji ke cheng jian gou xin de
wang mei juan lei xiao yu shi ya qing
..............page:10357-10358
xiao yi di li xin xi xi tong zai gong cheng ling yu de ying yong
chen yan ling
..............page:10414-10415
Radar Target Recognition Based on Independent Component Analysis
LI Wen-juan;CHEN Cui-hua
..............page:10371-10372
wu xian wang luo ji shu bi jiao
zhu hai ling
..............page:10277-10278
Secondary Vocational Technical School Computer Teaching
FENG Song
..............page:10347,10361
Design of Data Warehouse Model Based on Electronic Commerce
LIU Xiao-zhi
..............page:10222-10223
shu xue zi dong zu juan xi tong de fen xi yu she ji
li jie song yu
..............page:10338-10339
The Design of a Signal Generator Based on USB Interface Technology
ZHANG Hai-sheng
..............page:10309-10311,10313
Key Management Scheme Based on Heterogeneous Sensor Networks
BAI Wen-hua;DONG Chen;ZHANG Yi-jun
..............page:10233-10235
A New Water Quality Prediction Model Simulation
CHEN Zhen-wei;WANG Qian;HUANG Ji-hong
..............page:10366-10368
ji yu asp.net de zhuang tai guan li
huang jing jing
..............page:10215-10216
linux fu wu qi an quan fang fan ce lue tan tao
yang fan du zuo
..............page:10295-10296
Honeypot Technology Based Security Design of Campus LAN
DING Xiao-yan
..............page:10242-10243
The Study of C Language in Tibet Reform in Education
LEI-meng
..............page:10353-10354
License Plate Character Recognition Based on the Combined Features and SVM
XIAO Kun-ping;LI Jian-wei;HUANG Hong
..............page:10373-10375,10378
wang luo de yu jiao yu sheng ben hua guan li qian tan
wu yang
..............page:10442,10444
xiao yuan wang wang ye fang cuan gai ji shu yan jiu yu fen xi
li yue sun jian shen hong
..............page:10262-10263
Way Out of Advanced Vocational Colleges Cocmputer Education
WU Guan-neng
..............page:10348-10349
ji yu vhdl yu yan de 16 jie fir lv bo qi she ji
luo shi shu
..............page:10325-10327
Research on Evaluation of Multimedia Reference
QIN Meng
..............page:10400-10401
Resource Sharing in P2P Networks in the Present Study
WANG Fang-zheng;ZHU Jing-jin
..............page:10267-10268
A Summary of SNR
YANG Jun
..............page:10312-10313
Research of Defense System for Arp Attack Based on NDIS IMD
HU Qi-wei;CHEN Xian-long;ZHAN Shao-wei
..............page:10248-10251
Application of Storage Area Network(SAN) on Digital Library
BAI Ying;LI Jian-xin
..............page:10210-10211
eda+bb rang shu dian jiao xue geng feng fu
zou juan
..............page:10432-10433
School Equipment Management System Based on PHP
QIN Ke;CAO Jian-dong
..............page:10219-10221
Resource of Jatropha Curcas Management System in ASP
ZHENG Zhong-zhi;DUAN Peng;LIU Shuai
..............page:10206-10209
Discovery of C Language Programming Teaching
LI Ye;JIANG Yan
..............page:10426-10427
SymbianOS-Based Research on the Mobile Phone Gaming Engines
PING Fan
..............page:10384-10386
The Realization of UDP Traversal Through NATs Based on ACE
LIANG Wu
..............page:10256-10258
Implementation of Global Keyboard and Mouse Hook Based on VB.NET
WU Lin1;LIU Ye2
..............page:10328-10331
ji yu dreamweaver de div+css wang ye she ji chu bu yan jiu
huang xiong ping
..............page:10318-10319,10327
xiao yuan wang zhong ru qin jian ce xi tong de shi yan yan jiu
zhou run tao
..............page:10286-10287
Buildings Shockproof Management System Construction Based on GIS
LEN Yan-ping
..............page:10408-10409,10415
Choose and Configuration Based on ASIC Chip Hardware Firewall
LUO Xiao-hui
..............page:10259-10261,10268
Research on US Global Information Infrastructure
SUN Rong-min
..............page:10290
Application of Multisim in the Exercise Teaching of Analog Circuit
SHI Shui-e;YANG Hao-qiang
..............page:10344-10345
Research on Optimizing Detection Engine of Snort
GENG Feng;GUO Hong-shan
..............page:10246-10247,10255
bian yi yuan li wang luo ke cheng she ji tan tao
zhao zhi chao liu ying
..............page:10436-10437
Study on Safety Comprehensive Assessment of Hydro-Power Construction Sites
YU Ming-hui;YANG Hao
..............page:10410-10413
Studying and Summarizing of BP Neural Network
CHEN Liu-hao
..............page:10364-10365
Infrastructure Modeling and Simulation of Highway Based on FDTD
WANG Fu-ming
..............page:10418-10420
SSL-Based Security Model of Electric Power Network Communication
DENG Xiao-lu
..............page:10240-10241
shi lun ji yu ip wang luo de xin xi hua jie jue fang an
jiang hong jun
..............page:10217-10218,10221
guan yu gao zhi gao zhuan ji suan ji ji chu ke jiao xue gai ge de si kao
li jing jing liu wei li
..............page:10352,10356
ji yu silverlight de qi ye ying yong xi tong kai fa
yu li ping wang zuo
..............page:10307-10308
li yong word you jian he bing gong neng shi xian pi liang tao yin xue sheng zheng
tang guo hua zhang cong
..............page:10337,10339
wang luo gong guan fa lv gui zhi bian xi
wang guo cun
..............page:10269
A High-Performance Flexible Architecture of IPSec Processer
CAI Jin-chi;LU Wei-heng
..............page:10236-10239
feng su feng xiang qi xiang cai ji jian shi xi tong ruan jian she ji
he xiao dong zhang bing
..............page:10406-10407
Based on Adaptive Technology Database System of Development and Implementation
WENG Ye-lin;WANG Shan-tao
..............page:10201-10203
qian tan xu ni zhuan yong wang luo vpn ji shu de ying yong
yin mei gui
..............page:10284-10285
Faults Relationship in Wireless Sensor Networks
SHAN Shan-hong1;HUANG Ri-mao2;LI Chang-hua1
..............page:10252-10253
Application of CorelDraw Software in Graphic Design
LI Jing-yu
..............page:10322-10324