Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2005 Issue 11
The OO Design Patterns's Realization in C Language
ZHU Jin
..............page:99-101,105
A Cooperative Work Pattern for Testing and Development Processes
LIU Zhen-yu;TAN Han-song;CHEN Zhi-gang;XIONG Ce
..............page:94-95,98
A New Search Technique in P2P Networks: Intelligent Search Technique
SHEN Jie;HU Jin-chu
..............page:91-93
Research and Implementation of Automatic WSDL Generating System
QIN Wei;LIN Xue-lian;LU Peng
..............page:87-90,93
A Model- Based Data Mining System Used on Dam Safety
CHEN Di;ZHANG Sen;LI Quan
..............page:84-86,122
Research and Implementation of WWW Security Monitoring System Based on Protocol Analysis
LIU Qing-yun;YANG Chao-feng;LIU Li-jun
..............page:4-6,10
Threats and Countermeasures to Inter- Domain Routing System Security
LIU Ying-guo;NIAN Qi-feng;ZHU Pei-dong
..............page:7-10
Community- Based Reputation in Peer-to-Peer Systems
SONG Xue-chang;LU Jian-de
..............page:11-13,59
Sign and Encrypt SOAP Message Using X509 Certificate
RONG Jian-feng;XIE Rong-chuan
..............page:14-16,20
Analysis and Implementation of CORBA Security Service
WANG Fei;ZHANG Yue;CHU Zi
..............page:17-20
Using JAAS Construct an SSO Model Based on Kerberos
KAI Jin-yu;MO Lin;ZHENG Hua
..............page:21-23,39
Using Tree Reconstruction and NAK in Application- Level Multicast System
JIANG Yan;XIONG Qi-bang
..............page:102-105
DSS Framework Research Based on Grid
WEN Hua-jing;ZHU You-chan;WANG Chun-mei
..............page:136-138
An Edge-Detection Algorithm Based on Soft Mathematical Morphology
YAN Qi-sheng;WANG Shi-tong;YAN Xiao-fei
..............page:139-140,143
An Impoved Mixed Mining Algorithm for Mining Association Rules
NIU Yu-guang;DENG Liang
..............page:141-143
Study on Spring Framework in Data Persistence Layer
GAO Jian;ZHU Cheng-rong
..............page:106-108,111
Application of Cluster Technology in Message-Oriented Middleware
XU You-ming;CAO Yuan-da
..............page:109-111
Design and Implementation of Tree Type Catalogue Based on Web Component in Java
LI Guan-de;CHEN Meng-dong
..............page:112-114
Intelligent Test System for Insulated or Connected Resistors
QI Li-fang;LIU Hu;HE Zhan-zhuang
..............page:82-83,119
Study on Small Manufacturing ERP Based on B/S Model
ZHOU Ke-lan;ZHANG Yu-hua
..............page:80-81,114
Comparison of Two Kind of Fault - Tolerance Schemes and Analysis of Reliability
LIANG Xiao-ju;HE Zhan-zhuang
..............page:77-79
Design for Verification Platform of SoC
ZHAN Wen-fa;TAO Fang-ze;ZHANG Su;CHENG Zuo-ren
..............page:74-76,79
Study on Data Integration Systems of Digital Colliery Based on XML
GAO Jing;ZHU Jing-hua;WANG Qian-ping;DING Ying
..............page:70-73
Tornado API Analysis and Third Party Tool Integration Technique
XIE Qi-ting;XU Wei;MENG Xiao-suo
..............page:67-69,73
A Wavelet Blind Watermarking Algorithm Based on Domain Coherence
YUAN Jun;CHEN Feng-xiang
..............page:1-3
Research on Object- Oriented Design Metrics Based on a Specific Design Heuristics
LI Xin-ye;SONG Yu;ZENG Lin-na
..............page:118-119
Storing XML Data in Relational Database
YU Zhen-bin;WANG Xin-wei
..............page:120-122
An Electronic Transaction Protocol with Fair Contract
LIU Wen-yuan;DI He
..............page:123-126
Design and Implementation of EQS ACL Compiler
WU Yan-ping;GUO Gui-suo;LI Zeng
..............page:127-129,132
Technology of GIS Interoperability Based on Semantic Web
JI Bin;MU Bin;WANG Hao;XU Yong
..............page:130-132
Research Survey for Logic Neurons
LU Bin
..............page:133-135,138
A Digital Watermarking Technique Based on Independent Component Analysis
LIU Chang;LIU Zhi-jing
..............page:27-29
Research on a Security Model Based on Web Services Message Level
FU Deng-ke;HAO Ke-gang;GE Wei
..............page:30-33
Analysis and Research of Security Mechanism of Active Network
GAO Fa-gui;GAO Lu
..............page:34-36,126
Design of Data Warehouse Model in Field of Cadre Management
HOU Jian-chun;CHEN Meng-dong
..............page:40-42
Design and Implementation of Common Inaccurate Forward Direction Inference Machine Based on Java
CHEN Bin;CUI Zhi-ming;WU Jian;CHEN Gong-wen
..............page:43-45,48
Research and Application of MVC Pattern in OAS of Intelligent Buildings
ZHONG Luo;LIU Ling;XIA Hong-xia
..............page:64-66
A Complete Algorithm for Attribute Reduction Based on Dicernibility Matrix
LI Xiao-wei;WANG Na;LI Yong-li
..............page:144-146,150
Issuing and Encryption Technology about Database Application System
ZHANG Peng;L(U) Han-xing
..............page:147-150
Visualization of Disordered Space Data Based on Octrees Decomposing Method
WANG Jing-jing;HE Xing-heng;LONG Meng-meng
..............page:155-156,160
A J2EE Based Open Distributed Software Architecture
WANG Gang-ming;HONG Jing-feng
..............page:157-160
Application of AHP in CRM
QIAN Yu-rong;ZHANG Zhen-yu
..............page:46-48
Application and Realization of RFOW System to Stocktaking in Supermarket
HE Jia-jia;XIA Jian-jun;LI Zhen-kun
..............page:49-51
Management Information System of Electric Vehicle Charge - Station
WANG Yun-yan;JIANG Jiu-chun;NIU Li-yong
..............page:57-59