Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 24
Improvements of Compiler Principle Experimental Course Design
WANG Guang-wei
..............page:5851-5852,5863
The Application of Internet of Things Technology in Agricultural Modernization
LI Qiang;WANG Chun-shan;WANG Ai-xin;GUO Tao
..............page:5899-5901,5916
ji yu wu lian wang de gao xiao xue sheng kao qin xi tong she ji
wei song he dan na
..............page:5930-5931
ARP Spoofing Attack Network Security
CHE Shu-yan;SU Guan-dong
..............page:5795-5796,5800
Teaching Method of Information Technology Course in University
SHI Mei-fang;LIU Chun-yu
..............page:5862-5863
xin jian lian hua qi ye xin xi hua jian she cun zai wen ti de shen ru yan jiu
li ya jie xu guang hui wei qi
..............page:5750-5751
Study about The Tobacco Industry IT Governance Metrics Decision Support System
WANG Li1;YE Wei-quan2
..............page:5921-5925
Research on the Prevention of DDoS Attack
TANG Li-juan;SUN Ke-zhen
..............page:5777-5779
Exploration of Teaching on Group Query Statement in SQL
LIANG Wen-juan;ZHANG Yan-feng
..............page:5752-5754
wang luo yu xin xi an quan zai da xing guo qi zhong de ying yong
zhao wei ma li tao zhang qin
..............page:5789-5790
One kind of Improment ZigBee Network Routing Algorithm
MU Chun-guang;GUAN Wei-guo
..............page:5864-5866
Research on Domain Ontology Building Method
YIN Mei
..............page:5913-5916
qian tan gao zhi yuan de shu zi hua xiao yuan jian she
cha zuo
..............page:5763-5764,5779
Research on Application of Modal Method Based on Frame
LIANG Ai-ming1;YANG Yuan-yuan2
..............page:5878-5881
qian xi er wei dong hua she ji flash ke jian she ji
yu xiao
..............page:5891-5892
Applying Ahp on Rish Management System of the Special Equipment
GUAN Zhi-wei;LIU Xiang-min;XIE Chao
..............page:5893-5896
zuo yi ru he you hua zheng wu wei bo de ying yong
lei li ping
..............page:5926-5927
ji yu j2me ji shu de shou ji xuan ke xi tong de yan jiu
chen bin
..............page:5826-5827
worldfip xian chang zong xian zu tai ruan jian de she ji yan jiu
yu zhi liang
..............page:5816-5817,5827
ru he jian li he wan shan shi pin jian kong ying yong gong zuo ji zhi
pan huan xin yue qiao ma zhan wei
..............page:5888-5890
Design Technology of State Machine Based on Verilog and VHDL
JI Yong
..............page:5897-5898,5912
Application of IT in Teaching Management in Universities and Research
CAO Zhong-dong
..............page:5797-5800
The Design of Linear CCD’s Drive Circuit Based on CPLD
ZHANG Hui;LIU Jing;HE Si-ming
..............page:5917-5918,5925
Design and Implementation of RenRen Network System Based on SSH
WANG Hong-xing1;CHEN Jing-jing2
..............page:5932-5933,5936
Analysis on the Application of Internet of Things in Wind Farm
ZHU Xiu-qun;WANG Na
..............page:5919-5920
Design of Simple Workflow System and Application in the Document Circulation
JIN Jian-xun;YE Yan-ming;ZHOU Meng-xiong;CHEN Yan
..............page:5746-5749
gao ke yong xing xiao yuan wang tong xin zi xi tong she ji
cao jing lei
..............page:5761-5762,5790
an li qu dong fa zai bian yi yuan li ke cheng jiao xue zhong de ying yong
zhang ya juan feng ling xia
..............page:5858-5859,5861
Teaching Analysis and Discussionin the Course of Computer Network
WANG Zhong-yi;YU Xiao-kui
..............page:5853-5855
Proxy Server to use Mobile Messaging to Achieve Real-time Weather Information Sent
YUAN Yan-fen;LIANG Shen-qing;HUANG Jin-can;YE Qiu-ying;FU Ya-yu
..............page:5785-5786
zhi neng jiao tong zigbee chuan gan qi jie dian jie neng de fang fa he zhuang zhi
qian jian bo wang hai bo wang wei
..............page:5867-5868
yong authorware zhong de ji dian ji shu fang fa zhi zuo duo kong tian kong ti
jiang wei huang shao long
..............page:5842-5844
yi zhong ji yu wu xian chuan gan wang de zhi neng jiao tong yong du jian ce yu kong zhi xi tong
wang hai bo qian jian bo wang wei
..............page:5875-5877
Security Research and Design of E-card System
ZHOU Xian-bo;CHEN Jie-xin
..............page:5791-5794
Malware and its Detection Method
SHI Xu-ning
..............page:5810-5812
ppt wen dang bian ji de wan mei jie jue fang an
gong jian hua
..............page:5885-5887,5890
The Research and Application of Performance Testing
XU Yan
..............page:5909-5912
Computer Network Security and Firewall Technology
ZHANG Rui
..............page:5787-5788
Research on Application of Smartphone Forensics
QIN Zhi-hong
..............page:5869-5871,5874