Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 30
The SYN flooding Attack Principle and Its Precautions
TAO Tao
..............page:7208-7209
ji suan ji wang luo bing du ji qi fang yu tan xi
guo ren dong
..............page:7190-7191,7198
ji yu fu za wang luo li lun de ji suan ji wang luo tuo pu yan jiu
chen zhen
..............page:7175-7176,7205
An Algorithm of License Plate Localization Based on Histogram
YANG Li-zhi1;2;TU Li1;2
..............page:7335-7338
Management of Web Server
XIAO Meng-qiang;WANG Cheng-duan;YANG Ying-jie
..............page:7242-7243
Reflections on Improving the Effectiveness of the IT Classroom
TONG Yin
..............page:7283-7284,7315
lue lun 3ds max bu guang
zhang shu yu
..............page:7349-7350
ji yu wang luo dong tai de it qu zheng xi tong gou jian
lu hai long yi jing
..............page:7201-7202
Construction of Shared Database Platform
LIU Jian-feng
..............page:7158-7160
VPN Technology in IPv6 under the Environment of Campus Network Application
FENG Cai-ning;SU Peng
..............page:7177-7178
zhong zhi ji suan ji shi li yan lian jiao xue tan xi
xu cai xia
..............page:7293-7294
Research and Implement of the Permissions of the Information Management System Base on Struts
SHAO Fa-ming1;WU Hong-bing1;BO Yi-bo2;LI Xing-de1;CHEN Lei3
..............page:7141-7143,7160
A Power Transformer Fault Diagnosis Method Based on Association Rules
YANG Gui-yu
..............page:7167-7168,7174
A Research on the Positioning Based on CSS in Webpage Layout
CAO Lei
..............page:7339-7341,7346
The Application of the Internet of Things in Intelligent Community
MI Xue1;2 Co.Ltd.;Huainan 232087;China)
..............page:7203-7205
College Students’ Employment Information Construction Research
LIN Zhen;LIN Li-shu;HE Shu-luan;XIE Lei
..............page:7263-7264,7271
Resemble Degree Account of Basing Match Degree of Key Words and Question
SHI Feng-gui
..............page:7323-7325,7338
Human Resources and Social Security Integration Project Needs Study
WANG Zhao-lin
..............page:7394-7396
“Remote Sensing Technology and Application” Course Teaching Reform
LIAO Wen-feng1;ZHANG Jing-quan1;LIU Dali1;LIU Ren-zhao1;LIAO Wen-ting2;Tengzhou 277500 China)
..............page:7260-7262
ji yu java web de wu liu pei song xi tong de yan jiu
guan yong gang
..............page:7224-7226
1NF Fuzzy Temporal Database Data Model
HUANG Nan
..............page:7156-7157
The New Model of Joint Education of Software Technology Specialty of Higher Vocational School
LI Lan;HU Chang-jie;XU Xin-hua
..............page:7254-7257
Specific Applications of the Company’s Network Firewall Technology
LI Guo-dong at the Information Center;Jining 272000;China)
..............page:7199-7200
xian xing biao de dong tai fen pei cun chu jie gou fen xi
cao xiao mei
..............page:7216-7219
ji yu c yu yan cheng xu she ji jiao xue fang fa de yan jiu
zhang ji ling
..............page:7300-7301
The University Computer Room Management and Maintenance
LIU Li-lin
..............page:7265-7266,7277
A Practical Encryption Method of Software Protection
NI An-sheng1;TANG Chi2;ZHOU Hua1
..............page:7206-7207
rong zai bei fen xi tong ji shu fen xi ji yuan li yan jiu
ge qun fang
..............page:7182-7185
ji yu ms agent he tts de ju ben yin qing she ji yu ying yong
ling dai hong
..............page:7344-7346
Analysis Variety of Ways of Trojans Bundled and Disguised
YU Hai-wen;Nanchang 330031;China)
..............page:7214-7215
ji yu wu lian wang ji shu de shi yan she bei guan li xi tong yan jiu yu she ji
zhu gen liang lin yin ying
..............page:7381-7383
Data- Mining Technology in Graduation Thesis Management Applications
FENG Li-hui;FENG Li-zhi
..............page:7150-7153
The Research of Remote Fault Diagnosis Virtual Laboratory
XIE San-mao
..............page:7376-7378
Curriculum Reform and Practice of Computer Network Infrastructure Based on the Work Process
ZHANG Gui-qiang;GUO Jia;ZHANG Wen-chuan;WANG Bing-peng
..............page:7297-7299
Based of WebQuest Teaching Methods in Vocational Computer Teaching
ZHOU Wei
..............page:7302-7303,7318
Based on VR Technology Research and Application of Network Simulation Software
LI He-xiang;PAN Mei-lian
..............page:7252-7253,7262
yi gou rong he ji zhi xia wu lian wang wang luo ceng jie gou yan jiu
yin zuo zuo zhang wei gao yi yang fan shuang nan
..............page:7379-7380
Applying Multithreading and Huffman Algorithm to Compression of Vector Data
XIE Yi-Cai;ZHONG Jian
..............page:7332-7334
Discussion on Experimental Teaching of C Programming
XIA Yun
..............page:7287-7289
A Novel Performance Paragram for 802.11 CSMA/CA
WANG Ming-chao
..............page:7210-7213
A Ant System Incorporated Memory Behavior
CHEN De-xiang;SONG Wu;WANG Wen-bin
..............page:7319-7320,7334
Analysis of Recursive Algorithm for C Language
LI Wei
..............page:7229-7235
qian xi wu xian ju yu wang tong xin an quan ji zhi
guo ren dong
..............page:7227-7228
windows ad mu lu shu ju ku fang wen yan jiu
liu rong gang
..............page:7161-7163
Thinking about the University Computer Course Teaching
LV Jing
..............page:7272-7273
The Operating System Teaching Method Research
FANG Xia
..............page:7314-7315
The Application of Systematization Methods in JAVA EE Teaching
GAO Zhi-sheng;XIE Chun-zhi
..............page:7244-7247
Discussionn on Several Problems in CDMA Technology
FENG Hua-song
..............page:7179-7181
ji yu yun ji suan de tu shu guan xin xi fu wu yan jiu
leng yan ping hu
..............page:7386-7387
duo mei ti ke jian de zhi zuo ji shu chu tan
gong xue hui
..............page:7342-7343
A Brief Analysis of Cloud Computing Security
KONG Hui-huan
..............page:7196-7198
Using Online Teaching to Train College Innovative Talents
JIAO Ping-ping1;HUANG Shou-meng2
..............page:7250-7251
Teaching Method Research and Study of Information Technology
ZHU Miao-miao;NIU Guo-feng
..............page:7304-7305,7307
The Earthquake Emergency Command Reaction System of Hefei
HE Lin;PAN Dan;MA Ben;ZHANG Jie;DING Juan
..............page:7364-7367,7383
Personal Information Portal in Library research
LI Shuang
..............page:7388-7389
Analyzing the Limitation of an Application of Explicit Cursor in Oracle
CHEN Yi-kuang
..............page:7148-7149,7171
Discussion on the Software Testing Course
LI Zhao-cui
..............page:7258-7259
Hd video in Consultation with the Liaoning Province Meteorological Administration System Design and Application
LIU Qi-hai1;ZHANG Li-juan3;ZHANG Xu-yang1;YANG Fan2;DONG Ping1)
..............page:7347-7348
Probe Project Teaching in Higher Vocational Courses in C#
XU Guang
..............page:7295-7296
zhong zhi xue xiao xiao yuan wang zhan jian she tan suo
zhou jie
..............page:7392-7393,7396