Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Microcomputer Applications
1007-757X
2004 Issue 7
How to Design a Reliable Computer Network?
wang yun guang
..............page:62-64
On Web Application Development Based on Struts Framework
zuo liang ; huang guo xing
..............page:19-21,31
On Developing GUI Applications on Embedded Linux
lin jia wei ; sun wei wei ; chen jin hai
..............page:16-18
Design and Implementation of a Remote Thunder-Monitoring System
he jin zuo ; li wen yin ; zhou bin ; zhu wu guang ; zuo zhi chen
..............page:13-15
Design and Implementation of an Online Player on the Web
dong guo ; shao shi
..............page:10-12
A Persistent Framework of Data Layer Using Design Patterns
zhan yin qiang ; li jing ; zhang li ping ; wang xiao yong
..............page:5-7
Computer Science and Technology Applied in Bioinformatics
wan wei bing ; shi peng fei
..............page:1-4
An Algorithm for Implementing Time-Scale Modification With Phase Vocoder
wang jun kai ; hu fu qiao
..............page:57-58
Implementation Strategy and Customized Development of CA AMO
li jian jun ; zhang si rong ; song zi zuo
..............page:54-56
Improvement for the Network Surveillance System Based on Sns-110
fei zhen ; lin zuo xia
..............page:51-53
FTP Client Implementation on Lab Windows/CVI
qian feng ; rong meng tian
..............page:48-50
Implementation of BCH Error-Correcting Code With MatLab
zhang xue mei ; guo chun bo
..............page:44-46
A Strategy of Scalable,Simulated Pessimistic Concurrency
he hai jiang
..............page:41-43
On Security of Network Applications on Microsoft Windows
shen jie ; wang neng ; liu jian bo
..............page:38-40,53
A Gateway Design between LonWorks and BACnet Based on BAS
huang xiao feng ; xu ze zhu ; wang lin
..............page:35-37,53
Developing an Information-Visualizing System With GIS Technology
ni fen ming ; he yuan jun ; xu wei xiu
..............page:32-34,64
A Solution to Safe VPN for Enterprises
cui zuo
..............page:25-27
QoS in DSLAM and Its Implementation
lu shun ; rong meng tian
..............page:22-24