Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2012 Issue 8
zi xue kao shi bi ye yu ce suan fa de she ji yu shi xian
zhang chao zuo yang wen wei
..............page:1851-1853
xin xi shi dai zhong zhi jiao xue guan li chuang xin fang lue
ding jian bing
..............page:1946-1947,1964
Study in Web-Based Front End for Structured Query
XIONG Tang;TANG Yong
..............page:1723-1725
dian zi xin xi zhuan ye shuang yu jiao xue shi jian zhong ruo gan wen ti yan jiu
tong ya la yang xiao yan
..............page:1957-1958
Research on Java Language Teaching Reformation and Practice of Independent College
ZHANG Yin-qiong;DAI Xiao-peng
..............page:1886-1887
ji yu vmware xu ni ji shu de dhcp zhong ji dai li shi yan
lao cui jin qin
..............page:1761-1763
xiao yuan wang dan lian lu internet jie ru bi duan yu jie jue fang fa
wang zuo zhao yang long
..............page:1779-1781
guan yu duo mei ti ji shu ke cheng de tan suo yu yan jiu
wang chao
..............page:1923-1924
xian ji qi xiang wang luo xi tong wei hu guan li ji shu tan tao
zuo xue yi hu jin ping su hong juan qin xian zuo han ji xin
..............page:1774-1775
wang luo lun tan sou suo yin qing de she ji
tang yong sang li li
..............page:1968-1972
qian ru shi cao zuo xi tong gong neng fen xi ji jian hua yan jiu
yuan jin quan
..............page:1848-1850
Transactions of the Application in the C#
LIN Qin-hua
..............page:1827-1829,1847
Discussion and Research of Virtual Laboratory
QI Ju-hui
..............page:1940-1941
A Method to Do Lexical Analysis while Word-position Tagging
HUANG Xiao-bin;YU Yue-meng
..............page:1814-1817,1820
Researching The Detection of File System Abusing Behavior Based on Hidden Markov Model
ZHANFG Wen-ming;WANG Yi-qun
..............page:1803-1805
110kv zhong jian bian dian zhan de she ji ji shi xian
lv ren long
..............page:1933-1934,1936
Hit out Actively, Safeguard the Campus Web Server Security
LI Ai-feng;WANG Qiu-ping
..............page:1764-1765
Design and Implementation of the Campus Web Site Monitoring System
XIA Zhong-lin
..............page:1842-1843,1856
flash duo mei ti ke jian zhi zuo an li jiao xue zhi wo jian
wu fang ping zhong chang zhen
..............page:1925-1926
Several Methods to Embedde Swf File in Fla File
FENG Li
..............page:1916,1919
Based on State Observer of the Hyperchaotic Synchronization Research
ZHANG Ji-shi;XIA Bao-sheng
..............page:1854-1856
A CLIPS-Based Backward Inference with Uncertainty
LIU Hai-ming
..............page:1830-1835
MMI Design and Implement On Relay and Control Unit Based On Qt/E
GU Ling-yan;WANG Hong-ming;XIAO Hai-hui
..............page:1903-1905,1908
wang luo shi dai bu dui guan li mian lin de tiao zhan yu dui ce
lu li na tian zuo hu zuo
..............page:1801-1802
An Analysis on the Multimedia Courseware of the Classroom Demonstration
MA Qiao-li;BAI Yong-xiang;LI Min-ning
..............page:1920-1922,1926
ji yu gai jin ike xie yi de yi dong ipv6 de ipsec jia gou yan jiu
zhang xue wen
..............page:1799-1800,1802
Improvement ProjectStudy of Large-scale Green Energy Saving Computer Room
ZENG Zhi-long1;LU Chang2
..............page:1944-1945
Discussion on Establishment of Mechanical CAD Laboratory
DU Hou-xiang
..............page:1862-1863
Design of Intelligent Water Level Recorder
LIU Da-ming
..............page:1898-1900
shu ju tong xin ji shu zong shu ji tan tao
zuo lin
..............page:1809-1810
ji suan ji wang luo ji shu ke cheng jiao xue shi jian yu si kao
wu shun
..............page:1879-1880,1885
Study on Curriculum Reform of Applied Computer Technology in Vocational College
WEI Yan-jun;YANG Ming-li
..............page:1959-1960,1962
Base-on Randomized Tree Content-based Image Retrieval
ZHANG Rui-jun;ZHAO Hong-qiao
..............page:1913-1915
td-lte ji shu zai hu lian wang zhong de ying yong yan jiu
zhang rui zhang quan
..............page:1963-1964
duo jin cheng jian de shu ju tong xun fang shi de tan tao
li peng hui yan jun
..............page:1821-1823
Discussion on the Development of Mobile Internet
WU Nan1;HU Bin2
..............page:1782-1784
ji yu ipv6 huan jing xia yuan cheng zhuo mian de shi yong fang fa
chen yan jun liu yan chen ying ying yu qi long
..............page:1747-1748,1751
The Design of University Library Management System
ZENG Hui
..............page:1736-1737
Research on the Detection Technology of Image Spam
LIU He-an
..............page:1901-1902,1911
A Practice Platform of Network Information Security Curriculum Based on Mobile Agent
QIAO Zheng-hong;GE Wu-dian;XU Jie
..............page:1768-1771
Parallel Inspection Algorithm of Random Number Based on MPI
WANG Yang;LIU Jie;GONG Chun-ye
..............page:1838-1841
shui dian chang xin xi wang luo an quan fang hu tan jiu
jie jun feng
..............page:1759-1760
The System of Laboratory Management in B/S Mode
PEI Shan-shan
..............page:1953-1956
Server Virtualization in the Enterprise
LIU Hua
..............page:1929-1932
TV Stations in Digital Design and Implementation
XU De-lai
..............page:1726-1728,1740
duo gong neng wang luo shi yan shi de jian she yu tan tao
zhang shao min
..............page:1796-1798
Research on CAN Bus Research of Application of CAN Bus
XU Li-ping
..............page:1785-1786
The Research and Application of Network Evaluating Platform
CHEN Li;WANG Hong-yu
..............page:1811-1813,1823
yi zhong xin de ruo xin hao hun zuo jian ce pan ju
he ying
..............page:1891-1893
gps che liang yun ying guan li xi tong ying yong gong neng fen xi
fu xiao feng ye jian zuo zuo wei liu xue
..............page:1927-1928,1932
Hotel Management System Based on C#3.0
QIAN Feng
..............page:1741-1746
ji yu zhi neng wang de xiao yuan ye wu jie jue fang an yan jiu
ye jin ling ye wei hua
..............page:1912
xiao yuan zhi neng ting che guan li xi tong yan jiu yu she ji
li huan ling
..............page:1894-1897
ying pan bo chu xi tong de zu cheng yu ying yong
ma hai ying
..............page:1917-1919