Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer & Telecommunication
1008-6609
2009 Issue 10
The Integrated Research Based on XML Isomerism Database
wang wei dong
..............
page:62-63
Design of the Procurement Accounting Reengineering in Business Process Reengineering
he wan fen ; feng shuo
..............
page:59-61
The Discussion of Server Cluster Safety Based on Linux
ma wan tao
..............
page:68-70
The Application of the Situational Teaching Methods in Advanced Professional Computer Teaching
luo jian hua ; liao xiong ying
..............
page:66-67,70
Research on OFDM Synchronization Algorithms
jiang qing jian
..............
page:71-72,75
Construction of the Information System for Polytechnic College\'s Education Management Based on C/S and B/S
fan zuo
..............
page:53-55
Design of a Vehicle GPRS Wireless Internet
cai qi xin ; yu xu dong
..............
page:50-52
Design and Implementation of a Downloading Engine
wang zuo ; yang li ping
..............
page:64-65
The Application of Data Mining in the College Students\' Comprehensive Evaluation
yu cheng min ; zheng li ping ; liu yong tao
..............
page:56-58
Urban Planning Building Management Information System Based on Workflow Technology
li yan peng ; zheng zhi ; meng wei
..............
page:48-49,52
Design and Analysis of a CMOS Series Integrated Voltage Regulator
pei xiao min
..............
page:43-45
Orientation of LPR Based on Color Feature
li jing ; yang dong tao
..............
page:46-47
The Application Research of Binary Sort Tree Data Structure
ye yu ping
..............
page:41-42,45
Automatic Analysis Optimization System Based on Mobile Telecommunication Network
feng zuo yi
..............
page:33-35
The Research of J2ME Transplant and Optimization Based on Communication Facility
zhou jing ya
..............
page:38-40
The Implement of the Principle of Separation of Duties in Access Control Model Based on Exclusive Role
li bi yun ; shi jun ping
..............
page:36-37
The Design and Study of Distributed Adaptive Real-Time Intrusion Response System
xu bing zuo
..............
page:31-32,40
t-mobile he decarta he zuo tui chu xin yi dai ding wei yu dao hang fu wu
..............
page:25
mtn yu imimobile jiu da xing jiao yi jin xing he zuo , wei 1.03 yi yong hu dai lai yi dong he zai xian nei rong
..............
page:26
guo ji he zuo xiang mu tui jian
..............
page:27-30
wisekey yu da tang dian xin deng he zuo huo ban ji hua jia kuai xin yi dai sim ka de quan qiu bu shu , zuo wei di yu wang luo fan zui de di yi dao fang xian
..............
page:22
sun zai jia gu wen quan qiu da hui shang zhan shi xin chan pin xin ji shu
..............
page:23
nss labs chuang shi kuang ce shi fang fa qu shi ke ji yun an quan shou ken ding
..............
page:24
863" hai liang cun chu xi tong guan jian ji shu " zhong da xiang mu qian yue lang chao jing fei yu 2 yi
..............
page:19
guo qing yue bing shi shou ci cai yong dian xin 3g wang luo chuan shu shi pin tu xiang
..............
page:20
chao bian xie bi ji ben dian nao yong duo huan qiu zi yuan dian zi chan pin chuang xin she ji jiang \' nian du zui jia she ji jiang
..............
page:18
wang yi ke ji itu zhi ji zhong yi dong td-lte lu yan
..............
page:21
digi tui chu ye nei shou ge han you wu zhong bu tong wu xian ji shu de che dui guan li yuan cheng xin xi chu li she bei xi lie
..............
page:16
digi mian xiang zhu liu wei xing kai fa tui chu ye nei shou ge m2m kai fa gong ju bao
..............
page:17
3m tui chu xin xing 3d guang xue mo , zeng qiang shou chi she bei li ti xian shi gong neng
..............
page:12
adi tui chu yong yu 4g feng wo ji zhan de tu po xing she pin dian lu
..............
page:11
tong yi tong xin ji lei huan shi li qi ?
..............
page:8-10
divitas networks ling pao yi dong uc
..............
page:5-7
tong yi tong xin de qiao jie zhe corebridge
..............
page:2-4
ye jie shou kuan yong yu xiao fei lei yin shi pin she ji de hdmi 1.4 shou fa qi ke ti gong chao kuai su qie huan ji shu , tong shi jiang di she ji fu za xing he cheng ben
..............
page:15
lg dian zi xin kuan qiao ke li shou ji xuan ze rayspan de chao cai liao kong zhong jie kou
..............
page:14
wei ruan tui chu mian xiang wei lai zong tai gong yong shi ye de ruan jian jia gou
..............
page:13
tou gao xu zhi
..............
page:76
Research on Time-based Internet Access Control in Vocational Students\' Dormitories
zhao zhong fu
..............
page:73-75