Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2002 Issue 7
A PHYSICALLY RESTRAINED PLANT ROOT GROWING MODEL BASED ON PARTICLE SYSTEM
xiong hai qiao ; jiang li hua ; luo zuo xian ; liu xiao dong
..............page:39-41
OBJECT-ORIENTED SOFTWARE METRICS METHODS
lun li jun ; ding xue mei ; li ying mei
..............page:36-38
DESIGN OF FFT PARALLEL ALGORITHMS ON BSP MODEL IN NOWS
shang ming sheng ; wang qing xian ; sun shi xin
..............page:34-35,38
E-BUSINESS WEB SITE FOR STUDY
huang zuo
..............page:48-50,53
Design of Serial Adapter Based on Lonworks
huang tian shu ; xiang ji dong ; yang xian jiao ; sun fu xiong
..............page:51-53
Development of Linux-Based Embedded Systems
wang ce ; zhang lian fang ; dong zuo ; zhao yu ; zheng wu
..............page:54-56
Serial Communication Between PC and FACON PLC Series by Using the VB
cai jin da ; zhang wen guo ; liu zuo ran ; wu bai ying
..............page:57-59
Conformity Testing of BGP-4
sun chao jing ; zhao bao hua
..............page:60-61,64
A Dataflow Control State Machine and Its Implementation
yang hong yan ; li fen ; ba lin feng
..............page:62-64
Call Center Based on Distribution and Centralization
jing bo ; chen ming ; guo guan qing
..............page:73-74
Design of Workflow Management System Based on Relative Database
fan yong quan ; wang xu ben ; luo yu jun
..............page:75-77
Compatiblemess of Buses in the Application of Fieldbus
he qiao li ; hu zheng guo ; wu jian
..............page:78-80
Application of Remote Data Backup in E-Business Security Strategy
lu lin ; wang ming
..............page:83-85
Function Analysis of Windows NT′s Hardware Abstraction Layer HAL
guo jing zuo ; meng xiang di ; guo li hong ; tan zhen jiang ; yu yong
..............page:86-88
Object-Oriented Based Variant Design of Parts and Assembly Encapsulation
wang jing kun ; wang zhi ; ai xing ; zhang feng
..............page:89-90
Management of Active Directory with ADSI and Exchange CDO
wang xiao liang ; tao hong
..............page:91-93,96
Research and Implementation of Least-privilege of s-bit Program Based on Linux
lu wei dong ; song jin yu ; zhang zuo sen
..............page:94-96
How to Expedite Setting up Logical Channels in H.323 System
gao wu yang ; ma yue ; xu sai hong
..............page:97-98
Application of SSE in Multimedia Processing
li rui ; chen hao ; jiang zuo ming
..............page:99-100,103
Scheme for Developing MTS/COM+ Distributed Application by Delphi
zhou zhen hong ; yang guo lu ; chen yan ping ; wang fu ming
..............page:101-103
OA Development for Construction Engineering for Quality Supervision Station
liu zhi gang ; wei jian dong ; jin chao hui
..............page:104-105
An Information Query System of Urban IC Card Project
chen qing ; lu yi ming
..............page:106-107
CAsyncSocket Class for Asynchronous Network Communication
hu jing ; gu le ye
..............page:108-109,112
Experience About SQL Anywhere
zuo yong kang ; yue zuo ling ; xi chuan yu
..............page:110-112
Agent Implementation About Web-based Real-time Message Reminder in Domino
xu yuan chao ; pang hong bing
..............page:118-119
Multi-interactive Technology in CAD Software
wen guo jun ; xie jing rong ; feng de qiang
..............page:120-122
Self-adaptable Test System Based on Web
cheng ru zhen ; liu hong zhong ; yu hua long
..............page:122-124
Analysis and Defence of Buffer Overflow Attacks on Linux
yao jian dong ; qin jun ; gu zhi min
..............page:125-127
Implementation of High-Speed E-mail Sending System
wang yu ; zhang hai sheng
..............page:80-82
Interface Technology Between Delphi and Surfer In Data Visualization
tang jian guang ; zhao lian feng ; zheng zuo sen
..............page:127-128
A TRADE ENGINE MODEL BASED ON MESSAGE DISPATCHING AND TWO LEVEL REQUEST QUEUES
zhang zhi hong ; wang gui ping ; liang fei ; wang shi qing
..............page:31-33
A NEW DATA MINING TOOL POLY ANALYST
li jian ; liu hong xing
..............page:28-31
RESEARCH AND IMPLEMENTATION OF PRIVATE KEY MANAGEMENT IN PKI SYSTEMS
wei zhi dong ; zhao hua wei ; feng deng guo
..............page:25-27
RESEARCH ON ACTIVE NETWORK AND ITS APPLICATION
du xu ; huang jia qing ; yang zong kai ; cheng wen qing
..............page:21-24
MODELING NORMAL BEHAVIOR OF NETWORK TRAFFIC
zou bai xian
..............page:18-20
PARALLEL QUICK SORT ALGORITHM ON NOW
wang xiao niu ; he zhen xiang
..............page:15-17
FORMAL ANALYSIS OF MULTICAST GROUP DYNAMIC MANAGEMENT PROTOCOL IGMP BASED ON PETRI NETS
lu zheng fu ; yu guang de ; li ya dong ; wang guo dong
..............page:12-14,17
DESIGN AND IMPLEMENTATION OF SCML AND SCML4J PARSER
liu ; zhou ming tian
..............page:8-11
RESEARCH AND DESIGN OF VPN BASED ON IPSEC IN OPENBSD
zhou jing li ; li yan ; yu sheng sheng ; hu zuo feng
..............page:4-7
CRYPTOGRAPHIC AUTHENTICATION PROTOCOLS FOR SMART CARDS
lu zheng ding ; fu qin hua
..............page:1-3,7