Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2011 Issue 29
gao zhi yuan xiao xue sheng ping jiao xi tong de yan jiu
zhu min
..............page:7165-7166
qian tan gao zhi xue yuan ji suan ji ji shu zhuan ye jiao xue
zhu mei mei xu xiao ru
..............page:7214,7216
Network Security Evaluation Based on Grey Relation Projection Multi-Criteria Decision
YANG Jin1;CHEN Qing-bo2
..............page:7243-7245,7248
Ontology-based Semantic Search of Network Information
CHEN Jun
..............page:7250-7251,7256
Jingzhou city MAPINFO-based electronic map production
LIAO Wen-feng
..............page:7257-7258
Using ADO Technology to Access OLE Object Data in VC
DING Rui;ZHOU Dong-mei;YAN Qiang
..............page:7065-7067
Binary Tree Traversal
SHEN Jia-hua
..............page:7249,7254
The Investigation of Database Performance Testing
YAO Jing-ying
..............page:7090-7092
gao zhi yuan xiao jiao xue zi yuan ku de she ji yu shi xian
shen ai tao
..............page:7208-7209
Based on PHP Technology Online Test System’s Design
LIU Yan-jie;WANG Jun-hao
..............page:7172-7173
Research of Digital Network System Old-age Home Care Services
YOU Song
..............page:7174-7175,7180
li yong zong he chang jing jin xing web xing neng ce shi
xu yan li li feng
..............page:7106-7107
Design the Intelligent Traffic Controller Based on the ARM Chip
RAO Wei-dong
..............page:7222-7224
The Structure of H.264 Software Decoder and Optimization
LIU Guan-qun
..............page:7230-7233
gao xiao zhuan ye ji suan ji ji fang jian she yu guan li tan tao
li fang dong li yuan jing
..............page:7121,7134
zhong xiao xing qi ye wang zhan zi dong sheng cheng xi tong de she ji yu shi xian
wang wen xue wang li jun
..............page:7155-7157,7178
ji yu web fu wu de eai ji shu yan jiu
ye zuo
..............page:7137-7138
Buffer Overflow Attack and Guard Strategy
HUANG Wen-qing
..............page:7117-7118,7124
Railway Cable Fault Detection System Based on Queued State Machine in LabVIEW
GUO Shi;XUE Lei;ZHU Chao-xu
..............page:7228-7229,7233
ji yu gprs de zhi neng jia ju an fang jian kong xi tong
ren hong xia
..............page:7239-7240
Police Resources Scheduling Algorithm Based on Optimal Path
LIU Li-juan
..............page:7219-7221
qian tan ju yu wang de an quan guan li yu bao zhang
zhang wu shuai
..............page:7110-7112
The Application of Object-oriented Programming
WANG Shu-ai1;2
..............page:7289-7290,7299
ji suan ji wang luo jiao xue fa zhan tan jiu
cai dong
..............page:7179-7180
ge ren ji suan ji xi tong de an quan fang hu
huang ming hui
..............page:7144,7148
Flash Animation Graphics and Image Features Extraction and Analysis
WANG Yue-ping
..............page:7255-7256
Using Adaboost to Detect Oil Spill in SAR Images
SHI Yong-chun
..............page:7252-7254
Based on the Project-driven Reform and Exploration of Network Cabling
SHEN Yuan;NIE Li-ming
..............page:7317-7318
The Reaserch of Virtual Construction Technology Based on BIM
LIU Juan-hua;LI Yan-ni
..............page:7266-7268
On the Safety of Web Database
ZHU Lin;WANG Feng;ZHANG Xiao-jie;PEI Guang-hong
..............page:7093-7094
Ajax Technology Used for Personal Knowledge Management Platform
ZHUANG Huan
..............page:7158-7162
Practical Teaching Process of VFP Program Design
LIU Shi-ying
..............page:7191-7194
The Research of Methods to Prevent SQL Injection on ASP.NET Website
HUANG Xiao-hua
..............page:7078-7079,7081
qian tan ji suan ji ying yong ji chu ke cheng she ji
zhang
..............page:7315-7316,7318
SOA and Cloud-based System of Lending Book
DENG Xiu-hui;YUAN Zong-fu
..............page:7149-7151
wang luo tong chuan de ying yong qian xi
xu yu guo han zhao jun
..............page:7135-7136
qian xi wang luo tuan gou guo re xian xiang
chen zuo zuo
..............page:7145-7146
HTTP Live Streaming Secure Transmission Method
YAO Bao-yan
..............page:7259-7261
Formalization and Verification of IBS Protocol
ZHU Zhao-xu
..............page:7142-7143,7146
Computer Network Insecurity Factors and Its Prevention Methods
PENG Tian-wei
..............page:7129-7130,7141
The VFP Program Design Based on Network
GONG jin-song
..............page:7176-7178
Analysis and Discussion on Informationization of Digital Archives
YAO Hui-tang
..............page:7088-7089
Professional Skill of Professional Military Health Information Systems Research
QI Hong-jun;ZHANG Yuan;HAN Hong-liang;ZHAO Xin-lei;WANG Hui-ping
..............page:7074-7075,7092
Considerations on Development of Tablet Computer
ZHAO Jing-ya
..............page:7293-7294
Research of Fault Monitor Mechanism Based on Linux
QIN Si
..............page:7272-7274
dan pian ji de duo bo xing xin hao fa sheng qi she ji tan tao
du wen liang
..............page:7262-7263
guang dian ji fang she bei de qian ru shi web kong zhi qi she ji
zhang hai qiong zhang yu xiang
..............page:7277-7278
Research and Exploration on Teaching Method of Java
JIAN Xu
..............page:7185-7186,7207
The Length of the Key Influences on RSA System Safety Degree
WANG Heng-qing1;SONG Ru-min2
..............page:7104-7105
ruan jian qi ye zhong de jia gou shi zhi ze tan tao
zhou zuo jian xing shu bin
..............page:7295-7296
Research and Application of Intelligent Message Oriented Middleware
QIAO Pei-li;DU Rui
..............page:7246-7248
Based on Torque Game Engine to Pickup and Discard Items
QIU Li-fen1;2
..............page:7284-7286
The Curriculum Teaching Reform of Computer Graphic Design
SHENG Han
..............page:7199-7200
Cells Segmentation Research of Medical Images
LIU Sai
..............page:7237-7238
Principle and Implementation of HTTP Compression
SUN Guang-yi1;2
..............page:7275-7276
ke hu guan xi guan li xi tong de she ji yu yan jiu
chen sheng hong
..............page:7068-7070
The Research on Key Technology of Seal Design and Typesetting System
ZHANG Pi-zhen;HOU Rong-xu
..............page:7279-7280
ji yu wang ge de nong cun jiao yu zi yuan gong xiang yan jiu
yang ling li
..............page:7147-7148
ren wu qu dong fa zai gao zhi ji suan ji jiao xue zhong de yun yong
ni dong mei wang xue jun
..............page:7189-7190
yun ji suan ji shu zai hu dong dian shi de shi jian yu tan suo
ruan wei hua
..............page:7287-7288
ACM Pattern in ACCESS Application in Teaching
HU Ting-yan
..............page:7313-7314
Separating Business Rules Using Rules Engine and Web Services
ZHANG Wei
..............page:7108-7109,7112
The Application of Reverse Agent Technology in Campus Network
SHEN Zhong-cheng
..............page:7102-7103
hun he yun cun chu de qian jing zhan wang
li miao zai
..............page:7082-7084
Research of Query Optimization Based on SQL Server
WEI Yin-zhen1;CHEN Zhen-bing2
..............page:7085-7087
fang huo qiang zai wang luo an quan zhong de ying yong yan jiu
shang qing wei
..............page:7133-7134
oracle zhong chang yong de cha xun you hua fang fa
zhou ya feng zhu qi wen
..............page:7095-7097
An Algorithm for Mining the Most Frequent Itemsets Based on Matrix
LIU Jie1;GE Xiao-bin1;YAO Jun2
..............page:7234-7236
The Security of Wireless Communication Network
DU Wei-wei1;WEI Heng2
..............page:7115-7116