Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2011 Issue 11
Ethereal Network Protocol Analysis Based on a Network of Teaching
SONG Bi-rong
..............page:2521-2524,2526
Design of SNMP Agents in NGN Access Terminal System
JIANG Guo-song
..............page:2512-2513,2516
The Station Network Security Discussed Box office
HANG Zhen
..............page:2542-2543
Application of mixed programming of CUDA and DotNet in gray-scale processing
BAN Zhi-hua;CHEN Hua;LIU Tian-tian;GONG Li-li
..............page:2647-2648,2651
Using Excel,Making China’s Welfare Lottery 3D Ernie Program
MA Zhi-ming1;SHU Xiao-jun2;YANG Ting-ting1
..............page:2676-2677,2681
soa/.net huan jing xia de erp xi tong de she ji yu yan jiu
yang qing qing
..............page:2610-2611
The Design of Statistics Query Form Based on Visual FoxPro
LIU Zhi-nong
..............page:2598-2599,2604
The Reform and Practice on Computer Network Course Based on Working Process
BI Jun-lei;PEI Xiang
..............page:2619-2620,2622
ji yu bp shen jing wang luo de ke hu te zheng shu xing yue jian
yan chang qin li kun shen yun cheng
..............page:2640-2641
The Solution of Secure Network Platform of Digital Hospital
CAO Mao-cheng;HE Ji-fu
..............page:2505-2506,2509
mian xiang ji ben lu jing de ruan jian ce shi yan jiu
zhao jia yu
..............page:2583-2584,2592
The New Method of Interrupt Technology in Teaching
SHEN Shun-ling
..............page:2623-2624,2626
Design of Ethylene Material Transportation Vehicle Management System Based on.NET
JIN Wen-ting;LI Yong-gang
..............page:2696-2697
CORBA Technology in Telecommunication Network Management Application
DENG Lai-sheng
..............page:2688-2690
Using Fingerprint Authentication Technology to Improve Enterprise Systems Safety
PENG Shi-xin;ZHOU Jie;YIN Qin-yu
..............page:2551-2552
Simple Authentication User Registration of ASP Script Analysis
XIAO Guo-jin
..............page:2578-2580,2587
How to Install Software System in Room Batchly
ZHAO Fu-sheng
..............page:2731-2732
The Tray Talks about E-commerce Basis Teaching Methods
SHANG Hui
..............page:2737-2738
The Application Based on SOWF in the ERP System
ZHAO Nan-nan
..............page:2735-2736,2740
Designing Plan of Enterprise Internet Website
LI Song
..............page:2517-2518
Multimedia Database System of Research and Design
XIAO Yun
..............page:2501-2502
qian xi ju yu wang an quan xi tong she ji xiang guan ji shu
ou yang yue yuan
..............page:2525-2526
A Structural Join Algorithm TwigELM Based on Extended Interval Coding
SUN Qing-tao;LU Yan
..............page:2495-2497,2502
Servlet and JSP-depth Understanding of the Principle
FAN Zhen-yu
..............page:2570-2572
How to Deal with Large-scale Concurrent Accesses to a Website
SANG Ping
..............page:2553-2554
Software Interface Development Based on Mozilla Platform
ZHAO Xiao-ping;REN Yan
..............page:2612-2614,2618
The Research of Affective Recognition on the Human Motion Tracking
DING Yi1;2;FU Xian1
..............page:2649-2651
Floyd Algorithm Based Carpool Information Service System
HUANG Wen-tuan;GAO Ping;SHEN Zhang-guo
..............page:2510-2511
Asynchronous Technology in Guangdong Statistics of Meteorological Information
LIANG Shen-qing;YUAN Yan-fen;YE Qiu-ying
..............page:2596-2597
ji yu web de xiao yuan wang luo dian shi xi tong
huang hui kang
..............page:2668-2669,2671
Discussion of College Teaching Design with Examples
YANG Qing
..............page:2727-2728,2734
Implementation and Application of Human Resources Management System Based on SAP
CHEN Xue-li;CHEN Zhong-hui
..............page:2566-2569
vmware xu ni ji jian ce ji shu yan jiu
ma chen zhou cheng zhao li hua
..............page:2700-2702,2711
Application of Genetic Algorithm for Digital Watermark Security
MAO Shi-hao;WANG Hui-qin;LIAO Yong;GUO Heng-chuan
..............page:2652-2654
Space Graph and Its Application in Computer Science Learning and Application
FANG Qiao-qiao
..............page:2637-2639,2658
duo mei ti ke jian she ji zhong de ji dian mei xue si kao
bai jing hui bai rui
..............page:2662-2663
Method and Implementation Based on Web of Risk Management for Distributed Tunnel Construction
GONG Wen-hua1;LU Ling-xing2;ZHANG jing3;LI Ze-min1;CHEN bo1
..............page:2691-2693
The Design of Engine Behavior Module Based Petri Net
CHEN Bi-huan;HAO Yong-tao
..............page:2686-2687,2693
Control Code Based on RSC232 Centralized Control System for Multimedia
YE Jin-ling;LI Xia-ting
..............page:2678-2679
Cloud Storage Trend of Technology Development and Application
ZHU Guang-lei
..............page:2561-2562
ma jiang you xi ruan jian de ting pai pai xing fen xi
su xiao hu
..............page:2602-2604
Software Development Application of UML Technology
LIANG Fu-wei
..............page:2593-2595
Brief Introduction of M2M Security
SONG Yong-guo
..............page:2528-2530,2534
An Intrusion Detection System Based on Decision Support Vector Machine
YU Xiao-rong;GUO Chang-yan
..............page:2535-2537
ASP.NET Programming Language’s Teaching Discuss
FAN Yan-ying
..............page:2621-2622
Data Mining Technology to Network Marketing
ZHOU Xi
..............page:2503-2504
Construction of College Mobile Education System
BAO Han-zong;LI Hai-liang
..............page:2719-2720
Research on Appling Single Sign On to School Network
HUANG Wei-mei
..............page:2721-2722,2726
LINUX MRTG Network Environment Monitoring Research
WANG Nan-fang
..............page:2533-2534
Construction of Platform for Discussion-Based Learning Base on Jforum
YU Qian-cheng1;ZHANG Hai-Feng2
..............page:2607-2609
2010 nian shang hai shi bo hui ying xiang li de ding liang ping gu
wang jia wang na min zhao zhe hong
..............page:2729-2730,2732
Design of Dot-matrix LED Display Screen Based on Single Chip AT89S51
LI Zhao-jing1;2;HAN Chao2;GUO Lei-gang2
..............page:2706-2707
shi lun wu xian xiao yuan wang de she ji yu shi shi
li yan min
..............page:2519-2520
Optimization the PID Controller of Fin Stabilizer Based on Genetic Algorithm
ZHU Hong-hua;HUANG Yong-hua
..............page:2642-2644
yu wang luo ji shu zai qi ye zhong de ying yong qian xi
liao jian fei huang jin cai
..............page:2514-2516
ji yu .net de erp xi tong si ceng jie gou mo xing
fan hong mei
..............page:2507-2509
qian tan shuo hua ren shi bie ji shu
xie jian xun
..............page:2657-2658
Authority Management of SAP
SUN Shi-xue;SU Run
..............page:2527,2537
The Improvement of the Examination Online System’s Random Function
XU Hong-ying;LI Jie
..............page:2605-2606
Preliminary Inquiry of the Reform of Teaching Methods of ’Multi-media Technology and Application’
Muheyat·Niyazhek1;Gulishawuli·Talp2
..............page:2674-2675
IP-Based MGC System Design
TANG Heng-yao;JIANG Guo-song
..............page:2531-2532,2562
Let PPT in the Office Meeting so Vividly Played out
HUANG Jie-zhen1;ZHU Xuan2;CHEN Da-cheng3
..............page:2666-2667
qian xi sha du ruan jian zhong de yun an quan ji shu
zeng de ming
..............page:2538-2539
shi zhong tong bu xi tong zai ji nan ji chang de ying yong
wang jing
..............page:2712-2713,2718
Designing and Implementation of Network System Integration Training Center
ZHANG Han-bing;WU Jian-ping
..............page:2555-2556