Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 12
ssl xie yi de an quan xing ji qi fen xi
shen cheng dong zheng hai yuan
..............page:2726-2728
Thinking on the Internet Addiction Disorder
LI Wei
..............page:2809-2810
Threshold Citrusimage Segmentation Research and Analysis
WANG Jun;ZHOU Li-juan
..............page:2882-2885
Virtual Machine Technology in the “Computer Assembly and Maintenance” Application of Teaching
YANG Zhao-ping1;ZHANG Shang-mei1;NIE Bo-qin2
..............page:2839-2843
The Exploration of Experiment Teaching Reform Based on Moodle in Colleges
LAI Yong-kai;WU Bao-yan
..............page:2802-2804
vlan ji shu zai xiao xing qi ye wang luo de ying yong
li cui hong
..............page:2731-2734
wang luo jian ting de yuan li yu fang fan
chen wei jian
..............page:2691-2693
web an quan she zhi he dui ce
zhang bo wang xiu mei
..............page:2711-2712
ji suan ji wang luo an quan ji fang fan ce lue fen xi
zhao zhi qiang zhao lian feng
..............page:2718-2719
Upload and Download Technology in Java Web Development
YE Qian-wen
..............page:2776-2778
A Discussion on Technigues and Realization of VoIP QoS
LI An-bang
..............page:2684-2686,2693
c++ zhong lei ji cheng fang shi de tao lun
zhang yu
..............page:2781-2785
The Application and Research of FMS in College Quality Course Website
QIAN Jing;GAO Yue-song
..............page:2824-2825,2828
The Design of Driverless Vehicles Based on Wireless
YANG Liu;XU Lan-yan
..............page:2872-2873
An Improvement Method of Logging Statements Automatic Generation System
TIAN Xiang-zhai
..............page:2735-2736,2749
xin dian xin xi xi tong de she ji yu ying yong
lian yang peng
..............page:2903-2905
Parameter Auto-tuning of Hadoop Clusters
WANG Jiao;LIU Yan-feng
..............page:2768-2772
gao zhi wang ye she ji ke cheng gai ge yan jiu
ma ying ying
..............page:2817-2818
Automated Trust Negotiation Based on Mobile RFID
SUN Jin-fan1;2
..............page:2868-2871,2879
Research and Accomplishment of Supporting Platform for Project-oriented Teaching
FENG Sheng-an1;KONG Yi2
..............page:2740-2742,2761
Design and Implementation of Examination System Based on B/S Mode
ZHANG Xiao-feng;BAI Yong-xiang;WANG Zhong-yin
..............page:2678-2683
Mobile Digital Technology under the Conditions of Clinical Nursing Work Shift
YANG Zhi-ling;GU Chao
..............page:2915-2916
On the Life of Knowledge Migration in the Computer Teaching
OU Yang-fang
..............page:2822-2823
Pdf417 Two-dimension bar code Coding Technology Research
MAO Li-jun
..............page:2762-2763,2767
wu lian wang zhuan ye shi jian ke cheng jian she tan tao
zhao chuan xin wang yang chen fu long
..............page:2922-2924
cong ri shi 3g shou ji xi tong kan android xi tong zhi you shi
gao lei
..............page:2743-2745,2755
Research of Campus Teaching Resources Integration Based on Web Services
XUE Yi-sheng;FU Ce-qun;LIN Hong-yan
..............page:2773-2775
wang luo guang gao wu ran cheng yin ji dui ce
zhang liang
..............page:2920-2921,2924
Aerotriangulation Accuracy Analysis of the UAV Image Based on PixelGrid Software
LIU Qiang;SHI Jie;ZHAO Chen
..............page:2865-2867
ji yu fpga de dds she ji yu shi xian
ren dong dong
..............page:2764-2767
The Research of Project-based Learning Based on Work2.0 Website
FAN Jian-ming
..............page:2799-2801,2810
wise wang luo jiao yu ping tai xiang mu zi yuan an li jian xi
zhang xiao huan
..............page:2848-2851
Security and Defense Technology in the Campus Network Research
CHENG Xi-jia
..............page:2729-2730
How to Learn C Language
ZHOU Xiao-ping
..............page:2857-2858
A Mutual-healing Key Distribution Scheme in Mobile Ad Hoc Network
ZHANG Dong-hong
..............page:2713-2715
The Research of Application PowerDesigner on the Comprehensive Experiment of the Database
LI Ping;JIANG Rui;ZHANG Shun-ji;REN Xue-li;LAN Mei-hui
..............page:2671-2674
qian xi wcdma zhong de r99 he r4 he xin wang dian lu yu cha yi
liu xiao peng
..............page:2699-2700
Third-party Login Authentication with HttpClient Based WEB
ZHANG Tie-tou1;MA Li-xia2
..............page:2779-2780
ji suan ji ying jian wei xiu yu ri chang wei hu wei xiu gong zuo fen xi
zhou li wen xie wen kai
..............page:2854-2856
zhong xiao xing wang zhan ji yu fen bu shi shu ju ku de jian jin you hua ce lue
ma yi ning zhang xia chen jing ru
..............page:2665-2666,2670
Security Problems of Wireless Network Application
LIN Hong
..............page:2697-2698,2715
you xi jiao xue fa zai ji suan ji jiao xue zhong de ying yong
wu yong jie
..............page:2835-2836,2843
Research and Practice of the C++ Language Teaching Reform
WANG Tian-shun;ZHEN Ji-na;WANG Li-juan
..............page:2833-2834,2856
A New Anonymous Password Authentication Protocol
WANG Yao-min1;HE Weng-guang2;ZENG Hua1
..............page:2705-2707,2730
Application of the Wireless Sensor Networks in Agriculture
ZHAO Zun-jun
..............page:2720-2722
The Research and Design of Fan Monitoring System in Coal Mine
MA ZHI-jun
..............page:2898-2900
wen shi wen du jian ce ji bao jing qi de she ji yu gong neng shi xian
wang liang liang
..............page:2906-2907
Computer Basis Teaching Method for “Three Steps”
ZHANG Sheng-fang
..............page:2846-2847
ji yu mpi de bing xing yi qun suan fa de shi xian
cao ming gan yun wang sheng yan liu wen you deng pan wen peng dong hai
..............page:2863-2864
On the Campus Network and Security Threats and Preventive Measures
GAO Xiao-lin
..............page:2694-2696
DB2 Embedded Static SQL Application and Practice
CHEN Jing-yan
..............page:2667-2670
san ceng jiao huan wang xia de zu bo fu wu wang she ji he shi xian
wang xian ming
..............page:2701-2704
Developmental Robotic 3D Reaching Based on Double-Network Architecture
HU Lin1;CHAO Fei2 ;Xiamen 361005;China)
..............page:2859-2862
qian xi ji suan ji ying jian xing neng jun heng wen ti
li gu wei
..............page:2805,2823
mfc kuang jia cheng xu po xi
liu hong xiao yun fang
..............page:2753-2755
ji yu java de jian dan ji suan qi de she ji yu shi xian
zhu yun shun
..............page:2786-2787,2790