Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2005 Issue 10
Shader and HLSL in Direct3D
LI Xue-feng
..............page:105-107
A Method of Preserving Serial Communication Sampling Data Using Database
WU Fang-yu;ZHOU Yong
..............page:97-98,101
Contrast Between Using Remote View and SPT Technology in C/S Application
YANG Wei;GU Wei-biao;SHI Quan
..............page:93-96
A Security Frame for Mobile Agent System
LI Run-qiu
..............page:90-92
Applications of Rough Set Theory in Personal Investment Analysis
LU Yan-fei;LIU Cai-hui;WANG Qian-ying
..............page:39-42
Mining Algorithm of Frequent Itemset Based on Rough Set
LUO Lai-peng
..............page:36-38
Data Mining Technology and Its Application in Digital Library System
ZHANG Yong-mei;HAN Yan;XUE Hai-li
..............page:33-35,38
A Temporal Reasoning Method Based on Probabilistic Temporal Network in Situation Assessment
SUN Zhao-lin;YANG Hong-wen;HU Wei-dong
..............page:3-7
Study of the Memory Management
SUN Jie
..............page:8-10
Application of AR Model in Population Growth Prediction
XIONG Jian-ping;WU Jian-hua;WAN Guo-jin
..............page:11-12
Implementation of MVC Model in Java Application Programs
XIONG Yan;LI Jian-min
..............page:13-15
Analysis of Struts Framework
HE Feng-ying
..............page:16-18,22
Construction Process of Domain Feature Model Based on Orthogonalization
XU Jian-min;ZHAO Shuang;CHAI Bian-fang;WANG Jing-hong
..............page:19-22
Domain Model Design of Hospital Information System Based on UML
PANG Ruo-wei;WANG Wei
..............page:23-25,29
Research on MVC Design Pattern in Jiangxi Power Supply Company Compo System
LIN Yi-yun;HUANG Shui-yuan;DUAN Long-zhen;YAO Lei-yue
..............page:26-29
A New Data Mining Method Based on Rough Set Theory and Neural Rules Method
LU Guang-yi;FENG Ren-jian;WAN Jiang-wen
..............page:30-32
IMC of Crystal Process in MCA's Production
YANG Da-yong;LI Ming
..............page:111-112,115
Realization of Masking Any Keys on the Basis of Keyboard Hook Technology
LIU Zao-xin;FENG Shao-rong
..............page:113-115
Design and Implementation of GUI Software Based on Java
ZENG Ya-lin;GUO Bin
..............page:116-117
Collecting and Processing of Sound Signal with Visual C++
CHEN Dong-jiao;CHEN Jia-yan;WAN Zhi-hui;YIN Hui-hua
..............page:118-120
Bus Real-time Dispatch System Based on BRMS
SONG Yi-chao;XIONG Gui-xi;LIU Wei
..............page:121-123,126
A Practical Method of Creating Help File
CHEN Mei-juan;DING Guang-long
..............page:124-126
Several Methods to Encrypt the Web Page
YAO Lei-yue;DUAN Long-zhen;LIN Yi-yun;HUANG Shui-yuan
..............page:85-87
Research on Credential-based Access Control for Semantic Web Services
CAO Teng-yue;LI Yang;LI Qi-yan
..............page:80-84
Implementation of Java Communications Program Based on Client/Server Mode
WU Jian-dong;HUANG Guo-hui
..............page:78-79
Collaborative Share System of Campus Network Based on P2P
PING Liu-qiong;LU Li-hong;SHEN Xue-lai
..............page:75-77
Research and Implementation of B2B E-commerce Platform Based on Web Services and Workflow
LIN Qi-sheng;ZHOU Kun;DENG Bao-hua;YAO Dan-lin
..............page:68-71
Study on Distributed-tier MIS's Efficiency in Delphi
WANG Hai-rong;TANG Yi-xing
..............page:66-67,71
Compressed Computation of Video Information Based on Human Head Region Image Segment
WEI Zhong-hai;WANG Jian-yong;JING Xiu
..............page:60-62,65
Algorithm of Complexion Extraction in Human-face Detection
XIAO Hua;YANG Tie-lin
..............page:57-59
Adding Shear Function for AutoCAD
YU Chun-hui;WANG Fei
..............page:51-53
Mid Version in Cooperative Multi-version Technique
SHEN Qi;DOU Wan-feng
..............page:47-50,53