Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2011 Issue 12
Construction of Networks Security Course of Normal School
LIU Xiao-yue1;LI Li-shi2
..............page:2869-2870
Network System Risk Analysis and Rolution
ZHANG Fang
..............page:2814-2815
ji yu li zi qun suan fa de se cai zhi neng she ji
gao lin guo yu zuo wang xie zuo
..............page:2890-2891
wo xiao kai she dian zi shang wu zhuan ye de tan suo
hu li ping
..............page:2970-2971
dian zi ji shu xue xi chang yong kou jue tan xi
jin zuo
..............page:2959-2960
Data Security Defending Strategy of Information System
QIAN Lin-hong;DENG jia-rong
..............page:2763,2765
Hierarchical Memory Technology and Library Application
YIN Yi-Yan;LI Qian
..............page:2767,2773
wang luo an quan bao mi ji shu yan jiu
liu ze song
..............page:2789-2790
Research of Mine-shaft Wireless Sensor Network Based on Agent
HU Ping1;ZHAO Yan-xiang1;YUAN Chao2;ZHANG Yi-wei2
..............page:2785-2786
Fractal Interpolation of Logging Achieved by Using VB
GONG Xue-cheng
..............page:2835-2836,2858
qian xi nosql ji shi yong
cai jin hua
..............page:2757-2758
Answer Extraction Research for Chinese Question Answering System
LIU Ning-feng;SHI Xiao-dong
..............page:2865-2868
Design of Anti-theft Alarm System Based on AT89S52 MCU
LI Le
..............page:2896-2897
Sockets-based Chat Rooms Research and Implementation
ZHU Jing-li
..............page:2856-2858
ITIL Based Operation and Maintenance of Petrochina Marketing of ERP System
WANG Qing-chen;LIU Kun
..............page:2753-2754
ji suan ji wang luo an quan yu fang huo qiang ji shu
zhang jing jing
..............page:2801-2802
Flash Animation Film Production
WANG Feng-juan;LAN Cong-hua;ZHENG Gang
..............page:2927-2928
zhu ji xi tong an quan guan li ji wei hu
yang jiu ju
..............page:2941-2942
Two Cases of Physically Damaged Sector Hide of Hard Disks
HUANG Da-qing
..............page:2945-2947
xiang mu cheng gong cheng jie de ji qiao yu yi shu
zhang shu he
..............page:2770-2771
Discussion Intrusion Detection Several General Techniques
GAO Kai
..............page:2781-2782
qian tan xian dai jiao xue mei ti zai ke tang jiao xue zhong de ying yong
li kun jia wen juan
..............page:2955-2956
The Design of Vision Movement Control System Based on Halcon
LONG Yi-zhong;WANG Feng-bin;ZHU Meng
..............page:2900-2901
tan zhi ye yuan xiao duo mei ti jiao shi guan li yu wei hu
li guo zuo
..............page:2925-2926
The Design and Application of MapX in VC++
ZHU Hai-peng
..............page:2846-2848,2855
The Robot Based on AT89S51 MCU toTracking Soccer Design and Implementate
XIAO Chuan-hui;DENG Xu-hua
..............page:2907-2908
On-line Employment Advertise System Design Based on.NET2.0
TANG Ying1;ZHUANG Chang-xi2
..............page:2793-2794
xin xi an quan ti xi jie gou xian zhuang de yan jiu
chen bo zhu hong
..............page:2818-2819,2823
The Application of DSP to Intelligent Vehicle Path Tracking System
ZHAO Yan-xiang1;HU Ping1;YUAN Chao2;ZHANG Yi-wei2
..............page:2898-2899,2901
flash ke jian zhi zuo fang fa tan
zhao rong
..............page:2917-2918
The Research of Video Conference System on OpenMeetings
PENG Ling-hua;ZHAO Rui
..............page:2909-2911,2922
Basic Computer Teaching Pitfalls and Countermeasures
ZHOU Fei1;HUANG Quan2
..............page:2886-2887
guan yu jsp ji shu fang wen shu ju ku fang fa de yan jiu
gong fu ting
..............page:2746-2747
Build Network of Information Security Protection Systems
LIN Ri-guang
..............page:2807-2808
xiao yuan wang luo an quan ji shu yan jiu
zuo jing cai
..............page:2816-2817
shu ju ku you hua ji shu de fen xi yu tan tao
xi jie
..............page:2755-2756
p2p wang luo bing du chuan bo de fang zhen she ji yan jiu
he mao hui
..............page:2783-2784
Design and Implementation of The Classroom Tests The System Based on PPt Interface
YU De-hai;WANG Wen-xiang
..............page:2914-2916
Research and Implementation of Computer Room Diversified Teaching Mode
HONG Di1;LU Chang2
..............page:2968-2969,2973
Analysis and Control Strategy on Network Traffic
YANG Chao1;GUI Ying-qi2
..............page:2811-2813
Design and Implement of Fuzzy Query in JSP Pages Based on Ajax Technology
PAN Guo-rong
..............page:2837-2838,2841
Simulation in Computer Assembly and Maintenance Vocational Training Course
HU Qin-han;REN Yi;XIAO Guang-di
..............page:2892-2893
IOCP Technology-based Server Program Design
YE Yu;FU Yu
..............page:2844-2845
Research on Security Authentication in Wireless Sensor Network
MA Hai-song;LIU Yi-jun;ZHU Yu-hai
..............page:2791-2792
Optimization Design and Realization about Wiring System of Generic Cabling Systems
SHI Wei-zhong1;WEN Jian-jing2
..............page:2751-2752
The Teaching Method of the Animation Script Writing
ZHANG Yu-ting
..............page:2921-2922
Vocational Teaching of Computer Network Training
REN Yi;HU Qin-han;XIAO Guang-di
..............page:2875-2876
cai liao wei guan yuan zi pai lie de san wei xian shi suan fa yan jiu
hong yin zhi gu lin li jing tao
..............page:2932-2935
Improvement and Simulation Based on LEACH Routing Protocol
ZHAO Fang-fang
..............page:2798-2800,2802
A Trust Model Based on Recommendation and User Behaviors for the P2P Networks
HU Zhi;Yin Ji-yuan;LU Jun
..............page:2787-2788,2825
Analysis of Influencing Factors on the AWS Data Transmission Timeliness
DONG Ping;LIU Jin-xia;WEI Yi-fei
..............page:2764-2765
A Digital Library Service Chain Collaborative Frame
ZHANG Hui-ling
..............page:2961-2962
Applied Research on Android of Web Services
PENG Hai-wen
..............page:2851-2852
Analyses Static Meteorological Satellite System and Common Fault Handling
LUAN Yong-ming;REN Chuan;WU Kan;LI Zong-hao
..............page:2948-2949
The Research of the Learner-centered Learning Support System and the Strategy
TIAN Na1;WANG Lin2
..............page:2957-2958,2960
exchange you jian xi tong de an quan xing yan jiu
lao cui jin qin
..............page:2820-2821
Explore the Computer Network Security Strategy
LIU Shao-qiang;ZHANG Zhen-jiang
..............page:2809-2810
Spline Line Editor Research of 3ds Max
XIAO Li-Zhen
..............page:2842-2843
xiao yuan wang xin xi an quan qian xi
zhang chao
..............page:2824-2825
Military Information System Integration Based on SOA
LIU Zhan-long1;LI Chang1;FENG Xiao-jie2
..............page:2761-2762
kai yuan ruan jian de xian zhuang fa zhan yu ying li mo shi
zhang zuo tao hui
..............page:2831-2832
ji yu web 3d de xiao yuan xu ni man you xi tong de shi xian
chen sha wei fang jun guo xiao li
..............page:2902-2904
Think about Reform of University Basic Computer Teaching
PENG Ying1;LUO Ping2;FANG Shi-hong1
..............page:2873-2874
SQL_Based Intelligent Processing Algorithm of Multiple Condition Selection
YU Xiao-ping1;FENG Jin-long2
..............page:2905-2906,2908
QAM Modulation Based on High-speed Telemetry System
JIN Jian-zheng1;WANG Zhen-hua2
..............page:2894-2895,2904
qian tan wei cheng nian ren wang zuo wen ti tan jiu
yin chao peng
..............page:2822-2823
Web Data Cacheable Research and Application
YANG Peng-fei1;WANG Ying2
..............page:2795-2797
cdma2000 1x duo zai bo ce lue ying yong chang jing fen xi ji qi shi jian
feng qiao ling
..............page:2779-2780,2784
The Studio LED Screens Control System Design and Realization
CHENG Chang;WEN Lei
..............page:2923-2924
The Security Management for ERP Implementation Team
ZHANG Wei-zhong1;LI Yong-gang2
..............page:2774-2775
The Study of Complex Network of Hierarchical Algorithm
HUANG Biao;LI Yang
..............page:2803-2804
Computer-based Control of Shimadzu Electric Balance Based on B/S
TANG Ying1;BIN Hai-yun2
..............page:2839-2841
shi lun xin xi ji shu yu zhong xiao xue ke cheng de zheng he
zhong xiao dong
..............page:2963-2964,2967
Research about the Human-computer Interaction for the Auto-Harmonizing System
LIU Xiang-bin;FENG Yin
..............page:2748-2750
Triple DES Encryption Algorithm and Implementation of the Principle
DONG Qing-tan
..............page:2776-2778
Software Reuse Technology were Discussed
DU Yin-xia;Shijiazhuang 050091;China)
..............page:2833-2834
Computer Education from the Network Culture Research
TANG Wei
..............page:2880-2881
ji yu gao xiao wang shang ping jiao xi tong de she ji yan jiu
chen sheng hong
..............page:2768-2769,2775
The Construction of Practice Teaching System Based on Software Technology Specialty
MIAO Yong;WANG Jian;WU Zhen-hui
..............page:2871-2872,2885
gao zhi yuan xiao qian ru shi shi yan shi xun huan jing fen xi yu jian she
chen ping yuan dong zuo
..............page:2878-2879