Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Information Technology
1009-2552
2004 Issue 4
A high speed data acquisition system based on TS101 with PCI bus interface
zhuo zhi hai ; tao ran
..............page:14-16
Configuration of emulating router on experimental Internet
li ge xin ; hu chang jie ; li hu xiong
..............page:11-13,16
Application of support vector machines in traffic volume forecast
wang ji sheng ; gao bao cheng ; shi liang ping
..............page:8-10
The application of weighted association rules in network intrusion detection
pu jie xin ; xue bing bing
..............page:5-7
BP algorithm and its application in artificial neural network
hu jin bin ; tang xu qing
..............page:1-4
Situation and developing trend of SMS
li jing ; li hui
..............page:93-94
Research progress of network information search technology
liu hong
..............page:86-88,92
Analysis and realization of NAT based on VxWorks
li zhuo ; zhao wei ; guo shu xu
..............page:82-85,94
Solution of remote document transmission
qiu jian ; bi shu jun ; dang yu
..............page:79-81
A new technical of transmit voice and TDM cperation in the IP Internet
wen zhao quan ; guo shu xu
..............page:76-78,81
Research and practice on entrance guard system based on promixity card
he li fang ; fan jun bo
..............page:73-75
Research of outliers mining and its application on engineering
gao wei ; guan hong wei ; wang yan
..............page:70-72
Realization of process- scheduling policy in Linux
hu hai bo ; zhang xiu li
..............page:67-69
Time series model of FM jamming signal in noise jamming
li yi bing ; zhao zuo ; yue xin
..............page:17-18
A intelligent control mode for elevator operation
yang wen ji ; liu jian ; zhang kui
..............page:19-20,23
Application of Lonworks technology in distribution automation
zhou chang yong ; zhang xiao dong
..............page:21-23
Face detection in complex backgrounds based on hough transform
chen ai bin
..............page:24-26,29
UML model of parameterized graphics library based on Web
yu lin chong ; jiao jun zuo
..............page:33-35
Theory and application of the Lay-3 switching technology
guo dan ; xing zuo
..............page:36-38,42
Discuss on the lossless compression about the fingerprint images
liu yan ; wang ling
..............page:46-48
Embedded Internet and the application in the monitoring and control system
zhang quan gui ; liu jian hui ; tao zhi yong
..............page:51-52,54
The technical research of data warehouse
guo chuan jun ; zhu gui
..............page:61-63
Study of information security and encrypt on wireless network
li cheng yan ; zhang da zuo ; li hui hui
..............page:64-66,69