Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Science
1002-137X
2000 Issue 12
1999 nian < ji suan ji ke xue > ge xiang wen xian ji liang zhi biao de ping gu jie guo
..............
page:117
Relational Database Reverse Engineering Based on Object-Oriented Model
ma shu ; yu yong hong ; xu jie pan
..............
page:114-117
Process and Methods for Testing of Embedded Software
bai zheng
..............
page:111-113
The Design of Standardized Courseware Based Distance Education Management System
wang shao feng ; wang ke hong
..............
page:108-110
Implement Instructions Access Files Directly in Operating Systems
liu fu yan ; you jin yuan
..............
page:105-107,94
The Research of Embedded CORBA Model
guo bing ; xiong guang ze ; liu jin de ; li zhong wen
..............
page:101-104
Extreme Programming Model--New Software Engineering Model
pan qiu ling ; liu zong tian
..............
page:97-100
A Method of Training Code Book
xu jun ; ye cheng qing
..............
page:95-96
Discretization in Rough Set Theory
hou li juan ; wang guo zuo ; nie neng ; wu yu
..............
page:89-94
A Game Theory Negotiation Model Based on Multi-Agent System
zhang hong ; li xiao ; qiu yu hui
..............
page:86-88
On the Methods of the Object Recognition Based on the Invariant
wu gang ; yang jing an ; li dao lun
..............
page:81-85
Integrating Technology on Business Logic Tier of Enterprise Distrbuted Application
zhou jian ; zhou ming hui ; wu quan yuan
..............
page:54-58
Active-Node-Initiated Reliable Multicast
cai hong bin ; zhou ming tian ; yang guo wei
..............
page:50-53
Adaptive Wireless Protocols Performance Evaluation and Realization of Their Binding with IP
wang hai bing ; chen liang gang ; liu zhao wei ; zhang gen du
..............
page:46-49
Distrbuted Denial-of-Service Attack:Principle and Countermeasure
lin man zuo ; qian hua lin
..............
page:41-45
Using RDBMS in Netrwork Data Collecting and Management
wang pei zuo ; yang jia hai ; ren xian kun ; wu jian ping
..............
page:36-40
Implementation of a Kind of Multimedia Group Communication Mechanism
wang xing wei ; lu zhou xin ; zhang wei hong ; zhang ying hui ; liu ji ren
..............
page:34-35
Study of CORBA-Based Network Management Technology
hu jian ; liu jin de
..............
page:30-33
QoS Protocols and Architectures in the Internet
chen shu zuo ; zuo jiang xing
..............
page:27-29
20 shi ji zui wei da de zhi zhe zhi yi alan turing
song fang min
..............
page:24-26
BNR:The Tool to Analyse and Design the Minimal Deadlock-Free Fully Adaptive Routing Algorithm
deng bo ; yang xiao dong
..............
page:20-23
Design and Implementation of Task Scheduling Protocol in JAPS
li xiao ming ; chen dao xu ; xie li
..............
page:16-19,6
The Strategy of Java's Hardware Support in Embedded Systems
li zong bo ; hu shou ren
..............
page:11-15
A Survey of Database Updates
yang ge ; li lei
..............
page:7-10
The Problem of GIS Network Semantic Sharing
huang yu xia ; ke zheng yi ; he jian bang
..............
page:1-6
On the Data-Mining Oriented Methods for Clustering Time Series
li bin ; tan li xiang ; zhang jin song ; zhuang zhen quan
..............
page:76-80
Secure Environment for E-business Applications
wang zuo ; zhu qing sheng ; wu zhong fu
..............
page:73-75
Multi-Agent-Based Control Technology for Timed Process Series
xia hong shan ; zhang yao xin
..............
page:69-72
The Architecture and Object Model of Map Publishing Software
yin wei qiang
..............
page:66-68,72
Implementation of General Financial OLAP Analytical System
liu yao ; sun yu fang
..............
page:62-65,40
The Session View of Users in OLAP Systems
zhao yu yuan ; liang a lei ; bai ying cai
..............
page:59-61