Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2011 Issue 8
yun ji suan chu tan
jia wei hua
..............page:1748-1749
gong zuo liu ji shu ji qi zai wang shang shen pi zhong de ying yong
shi xiao qin zhao wen jing li rui hua
..............page:1756-1757
The Development of the Information System of Graduation Design Based on the Web
ZHANG Xiao-dong;LEI Gen-ping
..............page:1739-1740
Application of Struts Framework Technology in J2EE
ZHAO Yun-hong
..............page:1741-1742
Exploration to Data Warehouse Construction Techniques
YU Shao-jun
..............page:1725-1726,1733
Network Technology of Application in the Teaching
LIU He
..............page:1961-1962
gong lv bo dong yi zhi de dian chi chu neng xi tong
hong yin zhi
..............page:1947-1950
RFID and IOT Techniques
SHA Bo
..............page:1938-1939
LAN Based Project Informationization Research
LI Zu-chang
..............page:1754-1755
ji yu nurbs de fu zhuang ren ti jian mo ji shu
shi mei ya
..............page:1940-1942
The Design of an Online Forum
SUN Hui-zhen Co.LTD.;Huainan 232082;China)
..............page:1807-1808
Study of Energy-balancing Wireless Sensor Network Based on Cellular Automata
HAN Li-li1;LIU Xiu-ping2
..............page:1863-1864,1870
Innovative Electronic Information Inquiry Experiment Platform
YU Gong-li
..............page:1845-1846
Control System Design of the Asphalt Mixture Maxieer Stability Instrument
MA Dong1;WANG Min1;WANG Ning2
..............page:1933-1935
Discussion on the Implementation of Crystal Report Based on ASP.NET
SHENG Li-jun
..............page:1809-1810,1813
The Evolution of Enterprises Information Systems and Research on its Driven Factor
ZHANG Xin;ZHAO Wen-jing
..............page:1736-1738
Early Warning and Empirical Analysis of the Financial Risk on the Coal Industry
JIAO He-jun1;LIU Wei-hua2
..............page:1867-1868
Evaluation of Non-photorealistic Rendering Based on TOPSIS Method
HAN Bo;LONG Xi-hua;LI Gui-min
..............page:1860-1862
Photoshop Photo Processing Techniques Were Discussed
SHI Ye-jia
..............page:1891-1892
Face Location Algorithm for Computer
HU Xu-ming
..............page:1865-1866
ji yu yi chuan suan fa de gao xiao pai ke xi tong
song jin bin liu hong bing wang an jia
..............page:1871-1872
Open-source Support on the PC Cluster Storage Technology
TU Zhi-qiang
..............page:1943-1944
The Research of Human-computer Interaction Based on Touch-screen Technology of Move & Touch
WANG Hui;YAO Xiao-hui;JI Bo;RUAN Han-qing
..............page:1893-1894,1896
SMS Filtration System Design and Achieve
YANG Jing;CHEN Li-ping;ZHANG Ruo-xin;CHEN Xin-min;DU Wei-feng
..............page:1902-1904
Image Segmentation Based on Regions of Interest
GUI Xiao-ling
..............page:1857-1859
kong guan xi tong wang luo jian kong xi tong de she ji fen xi
yu hou gang
..............page:1769-1770
wang luo ru qin jian ce xi tong nids de xin ji shu yan jiu
zheng ying
..............page:1778-1779
wang luo xing duo mei ti xin xi fa bu xi tong she ji fang an
zhang yong gang
..............page:1783-1785
The Method Discussion of Inserting AutoCAD Graphic into Word Document
FENG Yan-ru;CHENG Yan-zhen
..............page:1794-1795
ji yu mtk de dian hua ben mo kuai de she ji
wang xiao chao wang min yao chen hong
..............page:1821-1822
Human Reliability Analysis During Software Testing
HE Miao;ZHANG Peng
..............page:1811-1813
li yong dian zi xian shi ping chuan bo gong gong ying ji xin xi
li na zhao qun wang jian xuan
..............page:1889-1890
ji yu arima de gui zhou sheng gu ding zi chan tou zi e yu ce
chen shuang
..............page:1912-1915
shi lun ji suan ji zi dong zu juan de chang yong suan fa
lv jian
..............page:1802-1803
Two Flaw of BAN-like Logics
WANG Qian;WANG Long-ge
..............page:1761-1763
Network Programming in the Specific Application of Visual Basic
YE Hong-xia1;2
..............page:1771-1772
ji yu she ji mo shi de yi liao bao xian xi tong
li ren xiao yan chen mei hua
..............page:1804-1806
The Research of Object Memory Allocation Process in Java Language
HUI Hua-xian1;ZHANG Jing2
..............page:1799-1801
The WEB-based Client EXTJS Set of Access Rights
YANG Zhu;SONG Shao-yun
..............page:1826-1828
wang luo gong cheng shi jian jiao xue ti xi de gou jian
li lei peng kai
..............page:1839-1840
A Tentative Study on Software Factory Teaching Model
YAN Gui-ling;ZHOU Bo;WANG Chao
..............page:1832-1833
Development of Video Monitoring System Based on the DaVinci Technology
WANG Shuai;YUN Wei-guo
..............page:1897-1899
Do a Macro for Excel to Get the Features of Slash Header
TU Xian-zheng
..............page:1816-1818
Implementation and Improvement of Banker’s Algorithm by C# Language
ZHANG Fan;ZHANG Wen
..............page:1829-1831
qian tan wu lian wang ji qi ji shu ying yong
zhou wei
..............page:1775-1777
The Wireless Image Transmision System Based on ARM
ZHAO Hua-wei
..............page:1773-1774
Research on Semantic Orientation of the Text Based on the Key-words
ZHANG Bin;YANG Zhi-xiao
..............page:1881-1883,1885
yi zhong yi web yu yi wa jue de ge xing hua xin xi tui jian she ji
zhao liang zhang yun zuo
..............page:1731-1733
A Study on the Security of Wireless Mesh Network
CHEN Xiao-fan1;2
..............page:1743-1745
ji yu multisim10.0 de wang luo hua dian gong shi yan yan jiu
peng zuo wang li juan he zuo
..............page:1951-1952
ji yu osworkflow gong zuo liu de shu ju shang bao xi tong de she ji
zhou you gong rui li wen zuo
..............page:1734-1735,1738
li san shu xue ke cheng jiao xue tan tao
zhao yong xiang
..............page:1853-1854
yi dong ban gong xi tong jie jue fang an fen xi yu shi xian
cai xiao hang
..............page:1746-1747
Analyze the Security Model and Policy of Cloud Computing
LIU Kai-hua;LI Xiong
..............page:1750-1751
The Implementation of Video Monitor System Based Embedded Linux
JI Bo;WANG Hui;ZHANG Ya-jun
..............page:1918-1919,1926
Discussion of Computer Network Security Technology
LI Na
..............page:1752-1753
A Discussion on the Teaching of Protel DXP 2004 Course
LI Zhen;LI Ying
..............page:1841-1842
flash ke jian zhong jiao hu lian xi ti de zhi zuo
li qiao ling wang xiao mei
..............page:1886-1888
An Algorithm Based on N-gram String Segmentation
LI Wen;HONG Qin;TENG Zhong-jian;SHI Zhao-ying
..............page:1720-1722
ji yu voronoi tu de zhi wen tu xiang te zheng ti qu fang fa yan jiu
liu bo ning feng xiao fang
..............page:1869-1870
Application of Climate Disaster Alarming Information Receiver Based on XFS4041CN
NAN Yi-ming1;ZHANG Wu-jie2
..............page:1929-1932,1935
Research on the Teaching Model of Dreamweaver Web Design
ZHOU Gai-yun;GAO Jing-li
..............page:1850-1852
Research on the System of Chinese Spam Filtering Based on Neural Net
YE Yan1;LI Pei-guo2
..............page:1875-1877
shi lun tu shu guan ji suan ji de wang luo xi tong wei hu
jiang yi chu
..............page:1786-1787
Design and Research of the Reporter Information Management System
ZHOU Chun-kai
..............page:1727-1730
tie lu zi dong jian piao xi tong de she ji yu shi xian
chang gong ping
..............page:1716-1717
Application Discussion of XML in Web Data Mining
LIU Yong1;XU Li-bo1;YU Wen-bo2;MA Li1
..............page:1723-1724
OPC Technology in the Digital Security Systems Integration
JIA Lin-hao
..............page:1920-1921
The Application of Plant Supervisory Information System(SIS) in the Power Plant
ZHANG Ya-jun;Yao Xiao-hui;JI Bo
..............page:1945-1946,1952
di ming gong gong cha xun xi tong de she ji yu shi xian
shen lan ning
..............page:1814-1815,1825
The Application of Genetic Algorithm in Traffic
CHEN Xiao-yan
..............page:1884-1885
hai liang shu ju cun chu xi tong yan jiu
jiang yu ming
..............page:1922,1928
Based on the Network Performance Test Sniffer
WANG Lei
..............page:1758-1760
The Application of Hibernate in System of Heterogeneous Databases
YAO Xiao-hui;WANG Hui;ZHANG Ya-jun
..............page:1713-1715
In B/S Test System Examinee Management and Control Realization
GAO Yi1;GAO Ling2
..............page:1796-1798
ji yu tms320f2812 de pwm diao zhi de shi xian
li xiao guang yuan lin liu bo ning
..............page:1927-1928