Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2006 Issue 10
Preliminary Scheme for Defect Inspection of Printed Material
DENG Zhong-hua;LIU Fei
..............page:171-173
Frame and Technology for Monitoring and Management of Illegal Buildings Based on 3S Technologies
SUN Yan;LI Li-jun;WANG Cheng;LI Jian;LIU Zhi-ming
..............page:174-176
Implementation of Monitoring System of Power Network Based on B/S Mode
MA Feng-ge;LIANG Xia
..............page:177-178,181
Design of Distributed Project Management System Based on J2EE
JIANG Wen-ke;JIN Wei-dong
..............page:179-181
One- Dimensional Graphic Display Method for Bus Monitoring
LIU Wei;XIONG Gui-xi
..............page:182-184,188
A Research on an Unified BOM Model Based on STEP
WANG Yang;ZHANG Yu
..............page:185-188
Model Transformation from PIM to PSM Using Software Patterns
LIU Kui;SONG Miao;CHEN Yi-fei;ZHAO Xiao-jing
..............page:74-76
Analysis on Genetic Operators
LIU Hong;WEI Sui
..............page:80-82
Research & Implementation of Extended Widgets Based on Qt/Embedded
LU Dong-xin;ZHOU Jian-bin;TAN Zhen-hua
..............page:97-100
Analysis and Improvements of BP Algorithm
JIA Li-hui;ZHANG Xiu-ru
..............page:101-103,107
Research on Method of Off- Line Handwritten Chinese Characters Recognition Based on SVM
WANG Jian-ping;CHEN Jun;XU Xiao-bing;WANG Xi-hui
..............page:104-107
Computer Simulation Algorithm Research of Three - Dimensional Plant
ZHANG Ming-shu;ZHANG Yan;WANG Wei-min;LIANG Li-kai
..............page:108-110,117
The Web System Construction Based on Struts
FANG Xian-wen;SUN Yu-dong;YIN Zhi-xiang
..............page:111-113,117
Amelioration Technology of Embedded Linux Real - Time Character
CHEN Wen-xing;ZHANG Hui-yi;TAO Tao;ZHOU Xiu-li
..............page:114-117
Constrains of Key Management in Wireless Sensor Network
ZHENG Yan;WANG Ru-chuan;GAO Ran;SUN Li-juan
..............page:118-121,170
A Histogram- Based Algorithm for Reversible Digital Watermarking
LI Yan;ZHANG You-sheng;ZHANG Ting
..............page:122-124
Research and Implementation of Detection of OS Based on TCP/IP Protocol Stack
SHA Chao;CHEN Yun-fang
..............page:125-127,130
A Design and Realization of a Rogue- Device Detecting Project in WLAN
XING Chang-ming;LIU Fang-ai;YANG Lin
..............page:128-130
Design and Implementation of a Secure E - Mail System in Enterprise
ZHANG Xiao-nong;XU Xiang-yang
..............page:131-133,136
Key Recovering Based on ( r, n ) Threshold Scheme
WEI Jia-hao;HOU Zheng-feng
..............page:134-136
Implementing Data Encryption and Decryption Methods for .Net Framework
WU Yong-feng;ZHONG Cheng
..............page:137-138,142
Authentication and Authorization in Grid
ZHENG Yun-yun;CHANG Zhi-quan;WANG Dong-lei;JIANG Yong
..............page:139-142
Data Mining Used in Intrusion Detection
SU Hui-gui;FU Xiu-fen;ZHONG Hong;SU Hui-cai;HAN Tao
..............page:143-144,148
A Fragile Digital Watermark Techniques Based on Encryption of Hyperchaos
GAN Yan-fen;ZHENG Sheng-lin;PAN Bao-chang;Zeng-Jian;ZHAO Quan-you
..............page:145-148
Semantics- Based Web Information Retrieval
HU Bi-yun;HUANG Yin-sheng;XIE Rong-chuan
..............page:71-73
PHP Event Mechanism Based on Hidden Field
JIANG Lin-men;ZHAN Ling-chao;HUANG Ji-feng
..............page:68-70,73
Exploration on HyperText Transfer Protocol
ZHU Yong-hong;ZHANG Yan-ping;XU Rong-bin;XIE Ying
..............page:65-67
Research and Application of Hibernate in Spring
ZHOU Cai-lan;LI Su-fen;SUN Lin
..............page:62-64,67
Design of Scanning Power Supply for Langmuir Probe Diagnostics
LI Zheng-ping;XU Chao;WU Rui-sheng;TAN Shou-biao
..............page:189-190,193
Research and Implementation of Adaptive Transport System Based on MPEG4
YANG ZONG-Kai;ZHAO Jun;WU Di
..............page:167-170
Application of LSI Model in Chinese Information Retrieval
ZHENG Xin-li;XU Yun-qing;LUO Chang-ri
..............page:160-162
A Color Image Watermarking Algorithm Based on Chaotic Encryption and Zerotrees Coding Idea
YANG Meng-zhao;LI Chao-feng;XU Lei
..............page:157-159,162
Research on the Role- Based Web Security
LI Xiang;GUO Xiao-lan;YAN Ye
..............page:155-156,173
A Forward Secrecy Protocol Based on D- H PKE System
LI Min;LU Jian-zhu;HUANG Yi-shuan
..............page:153-154,166
Transform Between Plane's Flight Parameter and Coordinate on Experiment of Flight Simulation
LIU Tong;XIE Jian-bin;DING Wen-xia;CHENG Jiang-hua;YAN Wei;LI Pei-qin
..............page:191-193
Design and Implementation of Digital Field Archeology System Based on .Net
ZOU Jie;GENG Guo-hua;ZHOU Ming-quan
..............page:194-195,198
Embedded System for Gateway Based on MPC7410 Processor
JIAN Dong;LONG Xiang;GAO Xiao-peng
..............page:196-198
Denoising of Heart Sound Signal Based on Adaptive Wavelet
ZHU Bing-lian;LIU Qian
..............page:83-84,88
Research on Measure Criteria in Evaluating Classification Performance
QIN Feng;YANG Bo;CHENG Ze-kai
..............page:85-88
Question Chunk Analysis with Neural Networks
FU Bin;FAN Xiao-zhong
..............page:94-96,100
Design and Implementation of Serial - port Communication in Traffic Volume Tester
JIA Rui-yu;LAI Da-rong
..............page:199-201,204
Analysis and Design for Main Memory Composition Structure of PC Machine
MI Gen-suo;WANG Rui-feng
..............page:205-206,210
Study on Principle and Performance Testing of MPLS Based on High Level Router
MENG Xiang-di;GUO Jing-huan;XIONG Mu-di
..............page:207-210
Design of JPEG2000 Arithmetic Encoder Based on FPGA
CHEN Wei;YANG Ming-li
..............page:211-213,216
Testing DBMS Based on Workflow
SHEN Jun;MA Rui
..............page:214-216
Improved Macroblock- Layer Rate Control Method
CHEN Lan;LI Xiao-hui
..............page:217-218,222
Application of TLU Training Theory to Mine CAD Plan System
GUO Jian-guo;YUN Qing-xia;YI Lin
..............page:230-232,236
Design and Implementation of Uniform Identity Authentication Service Based on SOAP
LUO Chan;DONG Li-li;MA Zong-fang
..............page:237-239
A Network Topology Model for Grid Service Deployment
ZHENG Xiu-ying;CHANG Gui-ran;ZENG Wan-dan;TIAN Cui-hua;WU Jie-hong
..............page:240-242
Research to μC/OS- Ⅱ Transplanting into LonWorks Network Node
DENG Yan-ni;PAN Ning
..............page:243-封三
Study on Method of Improving Efficiency of Software Testing
FAN Qing-lin;WU Jian-guo
..............page:52-54
Design of Density and Distance - Based Clustering Algorithm in Data Mining
TIAN Di;WANG Shi-qing
..............page:49-51,54
Research on Video- on- Demand System Model and Algorithm Based on P2P
YANG Tian-bao;ZHANG Xiu-ru;JIA Li-hui
..............page:45-48
LDAP's Framework and Its Practices
MENG Fan-zi;XIE Qi
..............page:42-44,48
Research and Analysis of OpenOffic. Org Document Structure
LI Ying;ZHU Fei
..............page:58-61
Application of CIM\XML in DTS/EMS
XU Xi;YANG Feng;DONG Zhao-xia
..............page:55-57,61
A Method of Steganography Based on DCT Coefficient
ZHAN Ling-chao;HUANG Ji-feng;JIANG Lin-mei
..............page:39-41
Design of Speech Recognition System Based on HTK
SHI Xian-feng;ZHANG Xue-zhi;ZHANG Feng
..............page:37-38,41
Analysis and Comparison about EIGRP and OSPF
LI Yan-hua;HUANG Hua;WANG Yu;SUN Xu-rong
..............page:35-36
An Inductive Learning Approach Based on Modified Rough Set
HONG Jing;CHEN Qiang;LIU Hui-bin
..............page:32-34,36
Comparison of Clustering Methods in Data Mining
WANG Xin;WANG Hong-guo;WANG Jun;WANG Jin-zhi
..............page:20-22,25
A Reusable and Self- Configured Routing Protocol Framework for Wireless Sensor Network
LI Wen-feng;WANG Ru-chuan;SUN Li-juan
..............page:17-19,152
Design of Distributed Meta - Learning Task on Grid
L(U) Pin;CHEN Nian-sheng;DONG Wu-shi
..............page:14-16
Research on Searching Tools for Requirement Analyser
LIU Zhi-xiong;CHEN Song-qiao;SUN Ying
..............page:11-13
Application and Improvement of Database Connection Pool Based on J2EE Architecture
HOU Can;YANG Zong-kai;LIU Wei
..............page:8-10,13
A New Delay Constraint Multicast Routing Algorithm
GAO Ling-ling;LI Wei-sheng
..............page:5-7
A Method of Implementing Dynamic User- Privilege Management Based on RBAC
LI Zhong;YANG Zong-kai;LIU Wei
..............page:1-4