Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information
1002-1965
2005 Issue 5
wang luo xin xi jian suo zhi shi de ren zhi yin su fen xi
tan jin bo ; li yi
..............page:86-88
The Theory of Enterprise Strategic Knowledge Management
Wang Ping
..............page:94-97
21 shi ji xin xi huan jing ji qi yan jiu zhu ti he te dian
meng hai dong ; zhang yu ying ; liu jiang
..............page:98-99
zhi shi zong he zu zhi lun
chen jing zeng
..............page:100-101
tu shu guan de jing ji xue fen xi
luo jian li
..............page:102-103,106
lun zhi shi guan li de shi kong xie tong gong neng
chen wen ping
..............page:107-108,111
zai lun hu lian wang zhong de ban quan bao hu
feng xiao yuan
..............page:109-111
An Analysis of Losing Customer's Massage in Mobile Communication Company
wu li na ; zhou zhi li ; liu bin
..............page:112-114,116
lun xin xi shang pin de kun bang ding jia ce lue
zhao guang lin
..............page:115-116
wang luo xin xi shang pin jiao yi de zhu yao zhang ai ji jie jue tu jing
wang juan ; wang lin
..............page:117-118,121
gao xiao tu shu guan wei qi ye ti gong xin xi fu wu de yan jiu
luo li ping ; yu chun li ; hu hong bo ; guo sheng hua ; xiang hong li ; tao xiang bao
..............page:122-123
kan bu jian de wang luo ji qi jian suo ce lue
chen hong qin
..............page:82-83
tu shu xian chang cai gou xi tong de she ji yu shi xian
xiong yong jun ; chen chun ying
..............page:77-78,76
ji yu web de xin xi guo lv ji shu
su yun ; ma hui fang
..............page:72-73
The Role of Digital Certificate in Information Security
Yang Erming;Liang Jiahua
..............page:69-71
xin xi chou qu de gong neng he shi xian fang fa
liu qi yun ; li zhong yan
..............page:67-68
gai jin yi chuan suan fa de shen jing wang luo mo xing yan jiu
luo chang shou ; zhou li ying
..............page:65-66
The Risk Perception in Knowledge Management
Yang Tong;Wang Nengmin
..............page:2-4,7
On the Information Risk of Enterprise and Its Approaches to Prevention
Zhang Gang;Xie Yangqun
..............page:8-11
dian zi shang wu jiao yi zhong xin yong zhi du jian she de bo zuo fen xi
yu zhong hua ; liu xiao hong
..............page:12-13,16
Forecasting Method under Uncertain Environment: Scenario Analysis
Zeng Zhonglu;Zhang Dongmei
..............page:14-16
The Study of Determining the Nature Valuation Method on Electrical Commerce Risk Analysis
fu shao chuan ; zhang wen jie ; ma jun
..............page:17-19
qi ye xin xi hua hui se ping jia fang fa yan jiu
jiang yan xia ; ke da gang
..............page:25-26,29
The Research of Case - Based Reasoning Using Backdating Methods
Mao Jinghua;LIU Hongli
..............page:40-41
The Application of EDI, XML, ebXML in B2B Application Integration
Huang Donglin
..............page:42-43,46
Research on XML - based Document Model for Product Cooperation Design
chen jing xia ; chen zuo ; zhang peng wei
..............page:49-52
ji yu java&xml de zhong dian xue ke dong tai dao hang xi tong de yan jiu
hu zhi hua ; deng jiang hua ; niu ji ping
..............page:53-54,57
yi yuan zhi shi guan li xi tong gou jia yan jiu
du fang dong ; sun zhen qiu
..............page:55-57
PKI/CA Interoperability Model in Mobile Ad Hoc Networks
Shen Ying
..............page:58-61
lun gao xiao tu shu guan zai xian can kao zi xun fu wu
zuo feng lan
..............page:126-128
xu ni can kao zi xun fu wu de fen xi yan jiu
peng qi zhi ; liu yu min ; zhang qun ; zuo ying
..............page:129-130,133
my library: zhi de guan zhu de ge xing hua xin xi fu wu fang shi
dong ming qiang ; sun yan ; yun ning xia
..............page:131-133
wo guo tu shu guan wang zhan jian she zhong cun zai de wen ti
huang xiu ying
..............page:134-135