Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 20
Comprehensive Training Computer Network
LI Chuan-qin;WU Mei-ping
..............page:4830-4834
Analysis of Security Models Based on Multilevel Security Policy
SHEN Mei-hui
..............page:4852-4854
On the Realization of Network Communication by Implementing WinSock in VC
GAO Ling-xia
..............page:4819-4822,4862
Grid Rresource Discovery Based on Ontology-driven Simulation Experiment
ZENG Xiang-hong
..............page:4808-4810,4815
English Handwriting Character Recognition Modeling Method
HUANG Yi-shi1;LIANG Yan2
..............page:4959-4961
dian zi shang wu zhong de zhu yao an quan ji shu qian yi
zhou xiu ping
..............page:5020-5021
Design and Research of Smart Machine Room System Based on RFID
ZHOU Jian-lin;GUO Xiao-jun
..............page:5007-5008,5019
ji yu lingo shi xian duo mei ti zhong tu wen de gun dong kong zhi
li zhi ling jiao li ping
..............page:4983-4985
ji yu wu lian wang de she bei zai xian jian guan xi tong de chuan gan qi jie dian she ji
yang huai wang xiao ping cai chuan
..............page:5000-5002,5013
A Simple and Practical Method for Recovering Lost Partitions
YE Wei;WANG Xin-ming;WANG Qian
..............page:5003-5006
Discuss Computer Network Management and Security Technology
QU Jun
..............page:4828-4829,4847
Inspiration and Thinking of the Computer Network Security
LIU Dan
..............page:4806-4807
Design and Study of Website Based on Three Layer Architecture
ZHANG Wei;WANG Yi-tian;WANG Jia-bing
..............page:4912-4914
jiao xue zhi liang jian kong guan li xi tong de she ji ji shi xian
wang jia xiang
..............page:4892-4894
ji yu soa de qi ye ying yong ji cheng fang an she ji
wen zhi hao
..............page:4857-4859,4866
The Campus Network ARP Attack Analysis and Defense Explore
SU Ning
..............page:4855-4856
According to the Technology and Application of FTTH
CHEN Wei
..............page:4921-4922
zhi neng jian zhu de lv se yu jie neng fa zhan tan tao
chen zheng ping
..............page:5015-5016
Realization of Monitoring Network Device Performance
LIU Xue-fei1;ZHU Zhen-yu1;WANG Shen-qiang2
..............page:4843-4847
JAVA-based Image Generator Design and Implementation
WANG Fei;HOU Wei-dong
..............page:4889-4891,4894
A User Interface and Module Design for Waveform Editing Software
WANG Li-sheng1;BI Wen-feng2
..............page:4895-4898,4901
An Improved RFID Security Authentication Protocol
ZHANG Shao-min;ZONG Jin-chong;LUO Zhuang-qiang
..............page:4962-4964,4969
j2ee jia gou de yan jiu ji yun yong chu tan
ma jian
..............page:4919-4920
ji yu duo dai li de xu ni qi ye gong zuo liu si xiang yu jian she fang an
chen xiao jie wang zuo juan
..............page:4869-4871
An Improved Key Authentication and Consultation Program of 3Gpp Applied Research
CHEN Chen-gang;WANG Xiao-yong
..............page:4811-4815
you guan ji suan ji ji fang guan li de ruo gan wen ti si kao
shi shu hong
..............page:4932-4933,4945
mu cai cai ji zi dong hua chu li she ji yan jiu
dai yuan da
..............page:4990-4991
Registration Study Based on Images of the Accident Scene
LU Jun1;2
..............page:4977-4980
Play a Better Role of the Enterprise Server Virtualization
LUO Hao
..............page:4848-4849
Investigation of "Web Page Design and Making " Teaching Reform Based on Vocational Ability Training
HU Xiao-hong;WANG Li-fen;ZHANG Jing-feng
..............page:4953-4956
ji yu huo fu bian huan de hua hen jian ce suan fa ying yong
xie ji feng
..............page:4957-4958,4961
Application of Data Mining in Logistics System
HUANG Shao-chuan
..............page:4791-4794
qiang hua vfp shi jian jiao xue , qie shi ti gao jiao xue xiao guo he er ji tong guo lv
peng zhi juan chen xiao yong yao zuo li yue hua
..............page:4923-4925,4956
Real-time Batch Synchronization Technology Embedded Systems
ZHENG Gang1;REN Xiao-feng2
..............page:4915-4916,4920
Software Process Reengineering Based on Different Languages
RAO Jian-nong;TANG Jie
..............page:4875-4878
qian xi zhong xiao xue shu zi xiao yuan de jian she yu fa zhan
bai jun tao
..............page:4951-4952
The Research of Low Quality Image Recognition Method Based on Iris Images
LIU Xiao-fei;LI Ming-jie
..............page:4965-4969
Scientific Management to Explore the College Computer Room
WANG Ling
..............page:4934-4935,4940
The Analysis of Real-time and Reliability for RTOS
HUANG Wen-han
..............page:4992-4993,4996
Designing of University Financial Management Information System
LIU Xiao-qun;ZHANG Hong
..............page:4788-4790,4794
yi zhong ji yu pppoe de arp bing du jie jue fang an
rao shu zhen zhou hai
..............page:4850-4851
Copier IC Card Management System Design
SONG Gong-xiang
..............page:5017-5019
Research on Quantity Optimization Problem of the General Ammunition Transport Vehicles
LIU Ai-zhen1;Chen Li-yun1;JIA Hong-li2
..............page:4997-4999
qian xi autocad zhong gao pin zhi tu xing shu chu de ji qiao
liu hong yan
..............page:4986-4987
bm ji qi gai jin suan fa xing neng dui bi yan jiu
deng xiao ming
..............page:4816-4818
Web Application Security Analysis and Solution Studies
HOU Li
..............page:4823-4825
Interface-based Terminal Automation Measurement and ERP Systems Link
WANG Yun-jin;WANG Xiao-dan
..............page:4902-4903,4906
W Model-based Software Test Design and Implementation
ZHANG Rui-qing;DONG Shu-juan
..............page:4909-4911
mysql suo jing zheng bi mian ji zhi tan xi
ming dao yang li si na
..............page:4795-4796
THE Pivotal Technology Research of Integration between ERP and PDM
ZHU Bin-bin
..............page:4917-4918,4922