Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Knowledge and Technology
1009-3044
2005 Issue 8
li yong windows 2000 server shi xian yong hu guan li zi dong hua
zhang chun qin ; xie li chun
..............page:72-74
The design of Charging System with Excel
ZHANG Hua-nan
..............page:75-76
yong cpld shi xian jie dian zhao ming zhi neng kong zhi
ma dong sheng
..............page:76-78
Mysterious Layer Mask
MA Li-shi
..............page:78-80
wang luo jiao yu ji wang luo zhen di yan jiu
xue feng ; liu zhen
..............page:83-85
bian ma jian pan lian ji de chu li
lu qing bin ; yang xin feng
..............page:71-72
yi xue xing tai xue shi yan tu xiang cai ji jiao xue xi tong she ji
zhao wen guang ; zuo yan hong
..............page:69-71
The Methods to Make Title Based on Premiere
LIANG Bin
..............page:68-69
C PROGRAM REALITION of TWO METHODS FOR SOVING LINER EQUATIONS
BAI Xue-feng;LI Pei
..............page:64-66
Construct & Manager a batch of users in The Win2003 Server
YANG Yi;TAN Mo-yan
..............page:62-63
xiao yuan wang luo an quan wen ti ji qi dui ce
liu li lin
..............page:60-62
yi dong ipv6 ji qi zai 3g wang luo zhong de ying yong
wang zhi gang
..............page:58-60
qian tan ipv6 di zhi de wu zhuang tai zi dong fa xian
yu jun wei
..............page:54-56
asp ji shu zai xml wen dang chu li zhong de ying yong
leng yu hai
..............page:49-51
p2p ji shu ji dui hu lian wang de ying xiang
shi lei ; wu hai yan ; li an ning
..............page:43-45
Denial of Service attack theory and countermeasure
WANG Ming-yan
..............page:38-40
wang luo huan jing xia de zhu zuo quan bao hu
wang guo cun
..............page:35-37
zhong xiao qi ye zhong wang ge ji shu de ying yong
xie shao shan
..............page:33-35
Multisense Information mixing System Based on Round Nerve Network
WU Jing;YANG Lu-ming
..............page:1-3
The realization of automatizely creating module of test paper
HU You-shu;SONG Shu-hui
..............page:4-6
yi yuan bing an guan li xin xi hua yan jiu
zhou zhao gang
..............page:8-9
Study on MPLS-VPN Technique
ZHU Kai-hui;DONG De-cun
..............page:16-19
Implementation of Controller-layer in MVC Pattern
SONG Wei
..............page:21-24
Network Security Technology in High Speed Rate Age
XU Jun-bo;DONG Jin-xin
..............page:24-26
Pattern Validation in ASP.NET by the use of Regular Expression
YE Wen-hui;LIANG Li-ning
..............page:27-28
An Investigation of Web Information Integration
CHEN Yan-xiong
..............page:29-31
qian xi fang huo qiang an quan ji xiao neng
liu hong min
..............page:31-33
qian xi jiao wu guan li xin xi hua
ling gui zhen
..............page:85-86
lun duo mei ti ke jian de zhi zuo
wang yan
..............page:86-88
wang ye zhi zuo ke jiao xue chu tan
chen zuo tao
..............page:93-94
ji suan ji er ji kao shi de xin da gang yu nan dian po xi
zhang bin bin
..............page:95-96