Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2011 Issue 14
Mingzhu Network ltd Network Construction Scheme
SONG Wei
..............page:3255-3260
flash dong hua she ji zhong de qian tao jie gou
zhang rui e bai lei
..............page:3460-3461
The Design of Manipulator Controlling System Based on MCGS
ZHAO Yun-ting1;JIA Wen-min2
..............page:3473-3475
Development of Power Detector Based on SCM
HU Peng
..............page:3462-3463,3465
The Analysis of Linux EXT4 File System
LU Ya-wen
..............page:3443-3446,3472
Image Semantic Annotation Based on BP Neural Network Algorithm
WU Yu-hua
..............page:3399-3400,3404
A New Method to Judge Whether Circular Queue is Empty or Full
GUO Wen-long
..............page:3464-3465
Intelligent Fire Alarm Aystem Design Research Based on Handset Platform
WANG Chang-qing;MA Xue
..............page:3420-3421,3439
Teach You Use Flash 8 Making MTV
WANG Shu-fen
..............page:3435-3436
Analyses how to do Well the Computer Teaching Strategy
HU Zhi-Wen
..............page:3388-3389
Photoshop Path Project Application Skills
YU Rong
..............page:3457-3459,3469
qian tan duo mei ti ruan jian zai jiao xue ke jian zhong de ying yong
fu yan xiang pan biao
..............page:3433-3434
A Scheme of Electronic Auction Based on Ring Signature
WANG Xiao-ming
..............page:3422-3423
tan tao ji yu delphi yong duo zhong fang fa tong ji hui zuo shu ju
he wei fen tang li li zheng shi you
..............page:3466-3469
qian tan wei ji zong bao zai ju bian dian suo de ying yong
xie lan lan
..............page:3453-3454
MAC Scheduling Algorithm Research in GERAN System
YAN Wei
..............page:3424-3425,3478
Research of Cloud Computing in Small Medium Enterprises Application
YAO Tian-xiang;XU Yun-hong;LIU Shuang-xia
..............page:3328-3329
About Network Intrusion Detection Technology Research
HE Wen-bin
..............page:3285-3287
java cheng xu she ji jiao xue gai ge yu yan jiu
he shou zuo
..............page:3372-3373,3389
SIP Protocol Design Based on Integrated Access Device
JIANG Guo-song
..............page:3249-3250,3284
The Discussion on Bilingual Teaching of Data Structure in Baotou Teachers College
WU Yun1;ZHANG Zhi-xiong2
..............page:3380-3381
On Information Security in Power System
WANG Shu
..............page:3316-3317
The Application of Entity Framework in N Tier System
XIE Ri-xing
..............page:3326-3327
Talking about the Courses Teaching of Linux Operating System
TAN Dong-ping
..............page:3393-3394
c++ zhong zhi zhen de yan jiu yu ying yong
zhang zhi qiang
..............page:3366-3369
On Quick Typesetting Skill in Word and Excel Office Document
XU Yan-yun
..............page:3455-3456
OSPF Application Research
SHAO Guo-rong
..............page:3306-3307,3321
Chinese and English Mixed String Segmentation Technique
YANG Zhen-yu
..............page:3426-3428,3480
County E-government Construction Strategies in Pingchang
LU Na;CHEN Ge
..............page:3294-3296
Student Internships Network Management Platform Design and Implementation
CHEN Xing-yi;TONG Qiang;SONG Xian-jun
..............page:3350-3351
shang hai shi bo hui ying xiang li ping gu
ma yuan long gao yi bo hu fan fan di jian ye
..............page:3414-3417
Research of Mining Association Rules on Individual Cluster
QIN Fu-gao1;SUN Yue-juan2
..............page:3418-3419
Task-driven Approach in Teaching Computer Research and Applications
LI Wei-liang;SHENG Chen
..............page:3376-3377,3398
The Exploration of Opening Education on Thoery and Application of DSP
HOU Hai-liang;CHENG Yun;CHEN Jie
..............page:3386-3387,3396
Research and Analysis on Students’ Scores Based on C4.5 Algorithm
HUANG Hai-xia1;XU Xiang-lin2
..............page:3405-3409
Recursive Data Structures Course in the Depth of Teaching
YAO Jun-ming1;XING Dan1;LI Qun1;GAO Ting2
..............page:3382-3383,3385
Research on Face Recognition Based on Real-time Video
JIN Xin
..............page:3410-3411
ji yu xiao yuan ban gong wang de chu cha shen pi xi tong de she ji yu shi xian
wang jin zhu he qin wan xiu wen wang li bin
..............page:3343-3344
Application of Curve Text Drawing Method for Plate Based on ObjectARX
YU Xiao-rong;GUO Chang-yan;CHEN Gang
..............page:3330-3332
The Discussion about Processes of Designing Web Page Based on the Web Standards
CHEN Jing-you;XIAO Zi-qian
..............page:3276-3278
NMIS of Universities Based on UML and.NET
WU Ting;WANG Xi;ZHANG Hui
..............page:3318-3321
Research on Workflow Security Mode Based on PKI/PMI
KANG Zhi-qian;XU Zhi-qi
..............page:3288-3291
The Design of Windows CE Embedded System Wireless Projector
CAO Jie1;FU Jie2;MA Xiao-yu1
..............page:3274-3275
ji yu web services de fen bu shi xin xi guan li xi tong she ji yu shi xian
wang fa bin zhang feng
..............page:3362-3363
qi ye wang luo guan li yu zhong duan yong hu bing du fang zhi ce lue
yu ben cheng lu yu yang
..............page:3270-3271
Design and Realization of Information System for Hidden Danger Subway
YANG Zhi-Guo1;2;GUO Xiao-tong3;LIU Xiang-yi3;YU Su-yong4
..............page:3364-3365,3369
Application of RIA in the E-commerce Virtual Experiment System
PENG Gui-fu1;LIU Zhen-xiang2;JIA Yan1
..............page:3304-3305,3311
phs wang luo de wu xian ce you hua
zhao xin
..............page:3335-3337
ji yu web de fa yuan pan li jian suo xi tong yan jiu
yang xue song ran zuo
..............page:3333-3334
ArcIMS WebGIS Based on the Research Campus
GAO Feng-min;LI Xiao-Li
..............page:3241-3243
Design and Implementation of a Encrypting File System
LIN Pei-tong
..............page:3299-3301
Design of SNMP Agents in NGN Access Terminal System
TANG Heng-yao;JIANG Guo-song
..............page:3263-3264
Discussion the Wireless Local Area Network Safe Solution
REN Jie
..............page:3281-3282
SOA-based E-government System Architecture and Key Technologies
WU QIU-ping
..............page:3312-3315
The Research of the Accessibility Website Design Based on Web Log Mining
TANG Heng-yao;ZHAN Xiao-yan
..............page:3261-3262
Analyses Intrusion Defense System
XIAO Jian
..............page:3322-3323
ti gao wang ye jie mian she ji yi shu xiao guo
li jing
..............page:3292-3293,3296
Building Internet Information Management System Based on J2EE Framework
DUN Bei-bei;WANG Chuang
..............page:3279-3280,3282
Tentative Discussion on Inspection of LAN Failures and Corresponding Solutions
WANG Hai-yan1;ZHANG Jing-yi1;ZHANG Hua-gui2
..............page:3310-3311
shi hua qi ye wang luo an quan ji qi jie jue fang an
meng qing xin
..............page:3302-3303
Design Development of Inventory Management System Based on.NET
JIANG Cong-cui
..............page:3338-3340
On The Performance of Oracle Database Tunes
WANG Hao;WEN Bin
..............page:3308-3309
The Network Test System’s Functional Analysis and Designs
XIONG Xiao
..............page:3345-3346,3355
Chongqing Daily News Group Recorded Primary Mail System
SANG Ru-hai
..............page:3253-3254
Discussion of Teaching Computer Courses in Secondary Vocational School
LIN Jian-hui
..............page:3390-3392,3394
BlueJ in Java Object-oriented Teaching Application
LIU Shu-lun;CHENG Ya-wei
..............page:3479-3480
xue sheng ye yu shang ji xin xi fen xi
li ping ping
..............page:3297-3298
ji yu shu ju rong yu de wu sun xin xi yin cang ji shu yan jiu
han shao jun
..............page:3233-3234,3240
Implementation of Network Management Program Based on SNMP4J
LIU Jia-le
..............page:3356-3358