Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2004 Issue 11
The Query of Currency Path Expression Based on XML Data
zheng gang
..............page:94-97
To Assess and Improve RUP with CMM
zhao yue song ; zhang ya jun
..............page:98-100,103
Implementation of Multithread Technique Based on VB.NET
ou guang yu ; deng gui ying
..............page:101-103
Software Reliability Assurance and Evaluating Technique
wang wen dong ; geng guo hua ; zhang gen yao
..............page:104-106
File Compressing Based on Dynamic Programming Algorithms
zhang hai liang ; zheng you cai
..............page:107-109
Research and Implementation of MVC Design Pattern on J2EE Platform
yang kai ying ; liu zuo
..............page:114-116
Application of.NET Technology on Development of MIS
wang jie ; yang zong kai ; wu zuo
..............page:117-120
Architecture Technology of Microsoft.NET and J2EE and Their Comparison
sun qing ; zuo yuan dao ; xu ming yi
..............page:90-93
A Survey of Searching Methods Based on P2P
wang guo ying ; su de fu
..............page:84-86,135
Study of Source-Specific Interdomain Multicast
li xiao yong ; zhang wei
..............page:80-83
Comparison and Analysis on Various Communication Modes of DDE in LabVIEW
wang huai xing ; wu ke ; liu zuo chun
..............page:77-79
The Delivery of Data of XML Based on SOAP among Network
mi hong ; wang zuo
..............page:73-76,79
Connecting and Controlling IP Phone by Using TAPI 3.0
zhang deng yin ; zhang zuo wei
..............page:71-72,123
Design and Implementation of a New Diff over MPLS Model
liu jian ; wan zhen kai
..............page:68-70,106
Face Detection Based on Wavelet Transformation and Support Vector Machines
yang you sheng ; wang yao ming ; guo shi jie
..............page:65-67
Design of Passive Authentication of Identity Based on USB
liao chuan shu ; han ping
..............page:62-64,109
Implementation of Data-Importing Technology with PowerBuilder8.0
li ti xin ; li lan you
..............page:56-58
Implementation of Dynamic Report Forms Based on ActiveX Component
zhong zuo ; li san de ; zhang kai song ; xia hong xia
..............page:54-55,58
Implementation of OpenGL 3D Animation Simulation System Based on VC+ +
han tao ; song wen zhong
..............page:52-53
Queue Data Structure and Multi-process Application in Embedded System
chen shuai ; zhong xian xin ; li xiao yi ; yu wen ge ; liu ji xue ; shao xiao liang
..............page:49-51
A Termination-Decision Algorithm for R&D Project Based on Support Vector Machine
zhou ming zheng ; wang jun
..............page:16-18
A Correction Algorithm of Sloping Image Based on Gabor Wavelet Transform
qu xin liang ; wei shou shui ; du yang
..............page:19-20,24
A Novel Routing Algorithm Based on Artificial Logical Spider-web
jiang ya jing ; li yuan jie
..............page:21-24
Design of Operating System Intelligent Tutoring System Based on JSP+JavaBean
fang peng fei ; yue cheng qing
..............page:25-26,29
Design of Data Acquisition Board Based on FPGA and PCI Bus
he wen bo ; sun de bao ; wu xin jian
..............page:27-29
A Data Warehouse Solution for Pharmaceutical Leading
chen zuo ; yuan yuan
..............page:30-32,36
Implementation of ANN Reasoning Based on Matlab and.Net
chen tao ; yang jian guo ; yang jiang yun
..............page:33-36
Analysis and Research of WEB-based Pattern of Bidding to Decision System
duan ai ling ; xiao le
..............page:37-39,42
GDI+ and Conversion of Images with Different Formats
liu hong shen ; chen xiao ping
..............page:40-42
Web Services Technology and Its Application in Virtual Enterprise
han lei ; zhou jun
..............page:43-45
Design of Tax Information System Based on J2EE Platform
chen yu han ; jiang hao
..............page:46-48,51
Design of Real Time Video Image Acquisition and Process Program Based on Video for Windows
xie zhi peng ; chen duan sheng
..............page:121-123
Using UML to Capture Functional Requirements of CCMS
jin jing mei ; sun yong
..............page:124-125,132
Features Analysis and Comparison of Role-Based Delegation Models
zhang li ming ; wang xiao ming ; li li
..............page:126-129
PKI and Its Application for Grade Management System on Internet
hu fan liang ; song ling
..............page:130-132
The Security Weakness Study of WLAN WEP Protocol
li qing ; liang xue jun ; jiang han hong
..............page:133-135
Application of Cryptography and Digital Water-Mark in Electronic Cachet
xu gang yi ; yu jian ping ; xie wei xin
..............page:136-138,141
Building Intrusion Detection System Models with an Improved Algorithm of Association Rules
zhu xiao dong ; zheng cheng ; le yi
..............page:139-141
Security Auditing System Based on Information Fusion
zhou zhen yu ; zhang dong ; chen tian long
..............page:142-144
Improving Algorithms Based on Alternative Covering Algorithm:Kernel Moving Covering Algorithm
zhao zuo ; zhang yan ping ; zhang zuo ; chen chuan ming
..............page:1-3
Design and Simulation of Network Scheduling Algorithm under Linux
li chao ; sun li juan ; zhang deng yin
..............page:4-6,67
Research on the Satellite Routing Algorithm
zhu li hua ; wang ru chuan
..............page:7-9,12
Algorithm for TANC-BIC Structure Learning
cheng ze kai ; lin shi min
..............page:10-12
A Model of Weight Vector Based on Attribute-combined
zhang shu guang ; cai qing sheng
..............page:13-15