Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
IT Age
1007-7820
2005 Issue 3
A Model of Identity Authentication Base on PKI
Zhou Qi;Zheng Xuefeng
..............
page:36-37,42
The Distributed Fault Management System for Wireless LAN Service
Fu Song;Wu Yuhong;Liu Jiong
..............
page:32-35
An Implementation Scheme of Video Signal Generator Based on PCI
Wang Xin
..............
page:25-28
Mobile IP-based Roaming Administration
Pei Zhiqiang;Zou Juan;Li Hui
..............
page:21-24,28
A Study of the Distributed Network Management Architecture
Zhang Yanlei;Ma Yuxiang
..............
page:17-20
A Research on the Piecewise Linear Transformation in Adaptive IR Image Enhancement
Zhang Xiujun;SUN Xiaoli
..............
page:13-16
The Methods for Communication Between the Application and Device Driver
Song Bin;Pei Changxing
..............
page:10-12,16
A Study of Dual-Frequency Planar Monopole Antennas
Tang Mingxiang;Zheng Huili
..............
page:7-9
The Simulation of Routing Protocols in Multi-Hop Wireless Ad Hoc Networks
He Hailang;Sun Xianpu;Ma Long
..............
page:2-6
JSP Security in Application
Li Jie;Ma Yuxiang
..............
page:61-64
An Overview of the International Video Compression Coding Standards
Sha Lina;Wang Ningzhang;Qin Tuanfa
..............
page:56-60,64
The Application of API Functions in Visual Basic
Li Yubin
..............
page:52-55
An Algorithm for Downloading Layer 3 Route Table
Zhao Guangfu;Jiang Jianguo;Yang Xiaoqiang;Wang Xiaofeng
..............
page:49-51
A Study of the Methods for Star Field Simulation in Vega
Kang Jinlan;Liu Yuqing
..............
page:45-48
The Universal Active Filter UAF42 and its Application
He Xiaoyun;Fu Fengling;Chen Nan
..............
page:43-44
The Application of Workflow Technology in the E-government
Liu Yinhui;Xu Xuezhou
..............
page:38-42
A Study of Face Sketch Recognition
Zhang Yingwu;Ji Hongbing
..............
page:29-31