Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Market
1006-6675
2009 Issue 7
man shuo " jin rong wei ji " huan ge jiao du kan jin rong wei ji
..............
page:2
jing ji wei ji xia xun zhao zhong guo ruan jian ye de ji hui
..............
page:3-4
jia qi lv se an quan zhi qiao guan qun jin chen zhu li shan dong shu xue huan bao gong cheng
..............
page:64
The Improving Route Maintenance of DSR Protocol
BU Hai-hui;ZHAN Wen-jie
..............
page:66-69
A Simple Multi-level Bit-stream Encryption Method
MA Long-Jun
..............
page:70-72
Kth Minimum Element Range Query Algorithm
Ren Hui-bin;Li Zheng
..............
page:73-77
Study on Identity Authentication and Management Technique Based On USB Key
Liu Hai-yan;Cai Hong-liu;Jin Long
..............
page:78-82
Time Synchronization Algorithm with Cross-layer Cooperation and Group Marking
Jia Ya;Liu Rong-wei
..............
page:83-87
Research of the Future Traffic Model in Mobile Internet Base Station
LAN Xu-chang;WEI Sun-bo;YIN Rui-xiang
..............
page:88-93
A Reliability Analysis Method of Network with CCF
Zuo Lei;Gui Xiao-yu;Li Shian
..............
page:94-97
An Application of Electronic Micro Payment Protocol of Payword in Taxi System
Zhang Jian-hong;Wang Yu-min
..............
page:98-101
A Design and Implementation of Mouse Dragging Model in SVG
LI Chang-Lin;REN Hui-Bin
..............
page:102-106
jia mi ji shu zai wang luo an quan zhong de ying yong
wang yu fang ; li tie jun ; liu wei
..............
page:107-110
A Study on the Computer Security Vulnerability
ZHU Yan-ling;NIU Shao-zhang
..............
page:111-116
yi dun gao ceng dao fang shan te jia kuai ben di hua zheng he jin cheng
..............
page:5
lei zuo chu ji da ji qin quan shan te wei hu xiao fei zhe li yi
..............
page:7
xin pin zhi chuang
..............
page:8-10
tong xin duan bo
..............
page:11-13
wo guo dian xin ye drm biao zhun yu ji shu yan jiu
niu shao zhang
..............
page:14-17
ruan jian wei you an quan fang wei wan zheng
..............
page:18-27
xin xing shi xin an quan
..............
page:28-32
xin xi an quan ti xi jian she si lu
..............
page:33-37
ru he rang an quan cong jian dan kai shi
..............
page:38-54
can hui dan wei jian jie
..............
page:55-63
yi dun ex ups zai yi dong ying ji zhi hui xi tong zhong xian shi shen shou
..............
page:6
yi dun zhu li nan jing di tie gong cheng
..............
page:6
yi dun chu xi 2009 zhong guo dian li qi ye shu ju zhong xin ji shu fa zhan feng hui
..............
page:7
Reviews of Technique and Development of Security Storage System
Wu Hong-tao
..............
page:117-122
yi zhong fu za shu zhuang ceng ci jie gou de shi xian mo shi
li bo
..............
page:123-126
dian ying chuan shu mo shi zhi bi jiao yan jiu
li zuo ya
..............
page:127-132