Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2004 Issue 9
Key Technologies of Virtual Library in Grid Environment
wang li hua
..............page:94-95,98
Data Management on Component- Based PDM System
li zuo ; lin ze ming
..............page:99-100,104
Rule Mining Based on Rough Set
lin yi ; liang jia rong
..............page:92-93,115
Design of DW in CRM System for Stock Exchange
wu pei hu ; song zuo tao
..............page:89-91,128
A Third Kind of Inconsistency in Ordered Decision Table
tang bin ; li long zuo
..............page:87-88
Knowledge Base System and Its Implementation Based on DLL
liu mei ; zhong pei si ; meng xiao jun ; ding shu hui
..............page:84-86
Study on Attack Means and Protecting Skills of DDoS
yan yi ; ning kui ; li tao shen
..............page:81-83,86
How to Actualize ERP in Manufacturing
zhou ke lan ; zhang yu hua ; zhu chun
..............page:75-77
Research on Extraction Method of Fingerprint Orientation Map
chen jian hua ; li tao shen
..............page:72-74,77
Serial Communication Between PC and 89C51 Single Chip in Windows2000
wen fu guang ; lin yong jun ; luo ting kun
..............page:69-71
Remote Control in Embedded System Based on CGI
yao hong zhi ; zheng xue feng ; cao lei
..............page:7-9,13
Application of Mobile Agent in Network Management
lai xiu jin ; wang cheng
..............page:10-13
MAS - based Intelligent Decision Support System
qi zheng hua ; ren xun yi
..............page:14-16,55
Fractal Dimension Study of Calculating Method
nie zuo xian ; zeng wen qu ; wen you wei
..............page:17-19,22
An Effective Algorithm of Association Rules Mining in Relational Database
wang fang ; wang wan sen
..............page:20-22
The Study of Probabilistic Logic
ji qiu ; wang wan sen
..............page:26-29
A Method of Simulating Object Model by Using UML
zheng yang ; zhang zuo
..............page:105-107,111
Construction of Web Services - based Distributed Application
zhang zuo ; zeng zhi yuan ; yan de han
..............page:108-111
Access Control Based on Role in Information System
li xiao lin ; zhang yan zuo
..............page:112-115
Multiple Channels Display Based on Parallel Environment
jiang zuo ; li li jun
..............page:116-117,121
Applying Use Case on the Software Development
ye bin
..............page:118-121
User-based Method to E - Government Portal Web Site Evaluation
mi ai zhong ; zhong cheng ; yang feng ; luo cheng
..............page:122-124
Application Research of Decision - Tree in Query of Software Component
xu jian min ; shao yan hua ; wang jing hong
..............page:125-128
Developing E-commerce Application with Java 2 Platform Enterprise Edition
zhang ping ping ; wang bing wen ; dai zhi cheng
..............page:66-68
Design and Implementation of VoIp Authentication and Accounting
zhang shu kui
..............page:63-65,68
Applications of Pro/Engineer in Reverse Engineering Surface Modeling
chen xu ling ; liu su
..............page:60-62
Weblogic Security Service and Application
mao li ; liu hai
..............page:56-59
Anomaly Detection Based on Sequential Patterns
qian zuo ; zheng cheng
..............page:53-55
Applications of Digital Signature Technology in J2ME/MIDP
nie cheng zuo ; wang cheng
..............page:50-52
A New Signature Mechanism Based on Multi-Mobile Agents' Cooperation
huang hai ping ; wang ru chuan ; zou yi ming
..............page:47-49,52
Research on Extension Element Model in Intrusion Detection
zhao ling
..............page:45-46,62
Prediction Method of Time Series Based on Dynamic Neural Network
han wei hua ; ning zuo gui
..............page:40-41
Multiresolution Markov Random Field Segmentation of Moving Object
zhong xing rong ; huang xian wu ; wang jia jun ; chen lei
..............page:36-39
Research and Optimization of Decision Tree Algorithm
wang jing hong ; wang xi zhao ; shao yan hua ; wang wu ling
..............page:30-32
Construct Bayesian Classifier Using Matlab
lu xiao yi ; cheng ze kai ; lin shi min
..............page:33-35,39
Design of Network Management System Based on SNMP
ma zuo ; liu yuan ; qin qian qing
..............page:1-3
Implementation Mechanism and Applications of NAT Based on Linux
jing jian zuo ; yu ning
..............page:4-6,88