Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2002 Issue 4
Traversal of Super-link—Application of Visual j++ in Internet
zhang rui hua ; gu qin lin
..............page:83-85
APPLIED MECHANISM ANALYSIS OF PARALLEL PROGRAMMING ENVIRONMENT MPICH
wang wen yi ; liu hui
..............page:1-3
KEY TECHNIQUES OF COMPONENT-BASED AND LOOSE COUPLINGENTERPRISE APPLICATION INTEGRATION
sun hong wei ; zhang shu sheng ; wang jing
..............page:4-5,8
MIDDLEWARE AND DISTRIBUTED COMPUTING
jiang xiong wei ; ma fan yuan
..............page:6-8
Keyboard Simulation by Using Java Swing Components
liu hua yi ; cheng hai ying
..............page:71-72
Conflict Management in Collaborative Design
tan long bing ; sun lin fu ; li xiang
..............page:73-74
Program Efficiency of Database Application with C/S Model
zhang xing liang ; yao jin ; dong jun hui
..............page:75-76
Real-time Transmission of Multi-media Data over Low-speed Line
jiang fu xi ; zhou xu
..............page:77-79
Building Application System by Using SOAP Mechanism Based on XML
shi ming hui ; sun rong sheng
..............page:80-83
CONSTRUCTION AND MONITORING OF PLC CONTROLLING NET
wang xiao cheng ; zhang feng
..............page:34-36,39
A Method for Expanding IP Addreses
zhou yong peng ; he ding xin ; ge zhi hua
..............page:86-87
Oracle 8i OCI Programming for Direct Path Load Application
liu yong ning
..............page:88-89
Automatic Creation of SQL Server Remote Database by ADO at Client-side
zou hai ; xiang nan ; zhou zuo
..............page:90-91
Advanced Application of Stored Procedures in SQL Server Database
sun xiao feng ; fan zheng qiao ; yuan hai wen
..............page:92-94
A Software Protection Technique Based on Public Key Cryptography
feng kai feng ; lv shu wang ; shu zuo
..............page:94-95
Fast Display of 3D Finite Element Meshes
liang zhen guang
..............page:96-98
Development of Real-time Data Display Controls in Monitoring System
jiang yu hong ; guan gen zhi ; xu xiao yu
..............page:98-99
Developing 3D Animation Program by Direct3D IM Framework in VC
yang ling ; chen wen jia ; zhao ming yang
..............page:106-108
Using EJB to Develop J2EE Application
ma ting huai ; zhao ya wei ; liu zhong
..............page:109-111
Application of Virtual Reality in Teaching
chen shou man ; jiang jian guo
..............page:111-112
DESIGN OF PLUG-IN STRUCTURE APPLICATION UNDER WINDOWS
liu yi ; chen hui rong ; rong gang
..............page:9-11,14
A SLICING ALGORITHM FOR OPTIMIZING C+ + PROGRAM
guo jing feng ; liu li
..............page:12-14
DESIGN AND IMPLEMENTATION OF QUERY OPTIMIZATIONBASED ON SIMULATED ANNEALING ALGORITHM
chen ji hua ; wang jian dong ; zhou dong ping
..............page:15-17
TECHNOLOGY OF ACCELERATING DYNAMIC WEB PAGE
zhu xiao hua ; yang jian gang
..............page:18-21
FAST FINDING THE CLUSTERS OF ARBITRARY SHAPES
liu bi hong ; fu hong guang
..............page:22-24
REINFORCEMENT LEARNING ALGORITHM BASED ONAVERAGE COST OPTIMIZATION FOR EACH STAGE
yin zuo zuo ; chen huan wen ; xie li juan
..............page:25-27
BUILDING AGENT BASED ON BASIC COMPONENTSIN REAL-TIME SYSTEM
wang bin ; zhang yun sheng ; wang chuan ; yang ye
..............page:28-30,33
ANALYSIS OF VULNERABILITIES AND SECURITY MEASURES IN ⅡS
zhang zuo ; xuan lei ; hu hua ping
..............page:31-33
VIRTUAL ENVIRONMENT MODELING TECHNIQUESAND METHODS FOR VIRTUAL MANUFACTURING
ning zuo ; yin guo fu ; xiao long ; liu xiao huan
..............page:37-39
VIRTUAL INTERFACE ARCHITECTUREAND ONE OF ITS IMPLEMENTATION BASED ON MYRINET
jiao zhen qiang ; xie jun ; chen yu ; du zhi hui
..............page:40-42,45
PLATFORM INDEPENDENT ARCHITECTURE FORNETWORKED MEASUREMENT SYSTEMS
li feng bao ; liu zhi yun ; gu tian xiang
..............page:43-45
Using OpenGL to Plot a 3-D Course
huang kui ; zhu xing dong
..............page:48-49
Building Automatic Testing System for Dense Wevelength Division MultiplexingSystem
ren li hong ; cheng zhi gang
..............page:50-51
Design Strategy of Local Network to Prevent Spoofing Based on ALCART 3 Layer Switch
nie zuo ; tian bin ; wu zuo zuo ; xie song hua
..............page:52-53
Analysis of Hacker Sniffer
tang hong ying ; yao han xing ; cao ze han
..............page:54-55
Invasion Detection System to Avoid Buffer Overflow
zhang heng ru
..............page:56-57
Simulation of Network Devices Based on SNMP Agent Technology
zhang xian feng ; qiu jin song ; jin lian fu
..............page:58-59
Research and Implementation of NDIS Network Drivers
li xiao zuo ; zeng qi ming
..............page:60-61
Implementation and Application of Computer Telecontrol
zhang liang ; zhan guo hua ; yuan zhen ming
..............page:62-63,66
Real-time Simulation Support System Based on Windows NT
qu xiao yong ; chen hui
..............page:64-66
Skills of Drawing Irregular Curves in AutoCAD
li yan ; lu hong tu
..............page:100-100
Multi-view Implementation and Communication in VC++ Applications
yue shao hua ; liu jin mang
..............page:101-102
Graphics Refresh in Windows Programs
qi bang qiang
..............page:103-104
Reading GPS Data of PDA Based on J2ME Technology
li lu qun ; liu bing
..............page:105-106