Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2007 Issue 23
shu ju wa jue ji shu zai wang luo xiao shou zhong de ying yong
yu jin ping ; qiu bo
..............page:113-114
fen bu shi ru qin jian ce xi tong
wang bing ; chen xiao juan
..............page:117-119
Algorithms of Neural Networks as Text Classifier
li shu-peng (school of computer sciences and technlolgy; wuhan university of technloloty; wuhan 430070; china)
..............page:102-103
yun yong asp ji shu shi xian wang shang chao shi
huang lin sheng
..............page:77-78
chui zhi sou suo yin qing de guan jian ji shu yan jiu
yu zuo ; yang dan ; zhao jun qin
..............page:31-33
mian xiang ngn de wei xing yi dong wu xian jie ru fang shi yan jiu
zhang zuo ; jia zhuo sheng
..............page:111-112
qi ye hu jiao zhong xin de xi tong ping tai she ji
zheng chao xia ; wang chun zhi
..............page:85-86
sou suo yin qing suan fa yan jiu
sun min yan ; huang li
..............page:124-125
ji yu web ping tai de wang shang jiao xue hu dong xi tong she ji
li li ; fang ren yi
..............page:146-147
Application of UML for University Course Selection System
du hua-bing (jingchu university of technology; jingmen 448000; china)
..............page:154-156
linux2.6 nei he she bei qu dong cheng xu jia gou yan jiu
ding xiao bo ; pan yu ; wang wei hua
..............page:46-47
Notes on Information Hypostasis of Tutoring and Meta-information Structure of Intelligent Tutoring Systems
jin xing; zhong yi-xin (center for intelligence science and tcehnology research; beijing university of posts and telecommunications; beijing 100876; china)
..............page:157-159
Application of Ajax in Office Automation System
kang bo; chen yan (information technology institute of juijiang university; jiujiang 332005; china)
..............page:28-30
shu zi qian ming suan fa yan jiu
zhang mei na
..............page:135-136
xian dai yuan cheng shi pin jiao xue ji shu yan jiu
han ai yi ; xia hong xia
..............page:148-149
Research of Grammar-generation
tang zhu-bin (zhejiang orient vocational and technical college; zhejiang; wenzhou 325011; china)
..............page:142-143
snort gui ze po xi
yu zuo
..............page:126-127
Design and Implementation of Department Working Plan System Based on B/S
he li-qun; zhan yong-ping (jiujiang college. jiujiang 332000; china)
..............page:72-73
ji yu ren wu qu dong he qos yue shu de web fu wu zu he mo xing yan jiu
li shu zhi ; nan bing fei ; wang ji sheng ; wu wen chun
..............page:108-110
yi zhong kuai su de guan lian gui ze wa jue suan fa
li tao
..............page:140-141
anfis yu bp suan fa zai han shu ni he zhong de ying yong he bi jiao yan jiu
fu hong wei ; zhang yu zhen ; zhang zhi qiang
..............page:128-130
ji yu gis de chuan ran bing jian kong guan li xi tong kai fa
li heng kai ; wang xiu li
..............page:97-98
Solution to the Crystal Report XI Memory Leak
zhang fan (college of geophysics and information technology; china university of geosciences ; beijing 100083; china)
..............page:36-38
Research on Tag Anonymous Protocol in RFID
wang yi-qun; wu zhong-dong (school of electronic and information engineering; lanzhou jiaotong university; lanzhou 730070; china)
..............page:43-45
Application of E-government System Based on Struts+Spring+Hibernate Framework
zhang nan-ping liao sheng-jun (school of computer sciences and technology; wuhan university of technology; wuhan 430070; china)
..............page:18-20
ji yu shen jing wang luo de zhong wen fen ci ji shu yan jiu
zhang yan mei ; hu wen shu ; zeng zuo
..............page:16-18
dds ji shu zai xin hao yuan zhong de ying yong
li xue
..............page:39-40
ji yu struts spring he hibernate de ji cheng kuang jia yan jiu
shao xiong kai ; yang jing tao
..............page:25-28
B2B Electronic Commerce and Supply Chain Management
kuang qing; xiong lei (jiang xi bluesky university; jiangxi 330098; china)
..............page:41-43
Implementation of CTI
xia huan; xiong gian-xin; liu wei (school of computer sciences and technology; wuhan university of technology; wuhan 430062; china)
..............page:48-50
ri ben shu zi nei rong chan ye de fa zhan
pei lei
..............page:3-4
led cheng xu she ji zhong de jian bian yu tong bu ji shu
fu yan ming
..............page:79-80
Video Surveillance System Solution in Next Generation Network
yang liang; song xiao-hong; zhang ning (computer and information technology of beijing jiaotong university ; beijing 100044; china)
..............page:104-106
li yong dan pian ji ji shu shi xian yi tai wang tong xun
liu chang peng
..............page:106-107
dui gao xiao xue sheng dang jian wang zhan jian she de tan tao
xu dao xuan ; zhou guang hua ; yu jin fu
..............page:94-96
jiao yu zhu ti zi yuan wang zhan de jiao xue she ji
wang ji guo ; liu rong guang
..............page:152-154
ji yu jms de fen bu shi huan cun shi xian tan jiu
leng quan
..............page:34-36
Application of Learning Object Repository Based on Metadata
shi song-fang1; mei li-wen2 (1.jiangxi blue sky university; nanchang 330029; china; 2.city college; wuhan university of science and technology; wuhan 430083; china)
..............page:51-53
authorware de internet ying yong
feng juan juan
..............page:66-67
zhong li chang san wei ke shi hua ji shu de yan jiu yu shi xian
xiao dun hui ; liu hui ; shang wei
..............page:64-66
shi yong pki he jsse shi xian java an quan tong xin
zhang song
..............page:119-121
Network Security in Library and Countermeasures
huang yu1; lan yi-hua2 (1 library of hubei university of technology; wuhan; 430068; china; 2 huaihai institute of technology; lianyungang; 222005; china)
..............page:122-123
Exception Handling Based on Java
li guan-feng (ningxia university; yinchuan 750021; china)
..............page:137-139
ji yu apriori gai jin suan fa de ru qin jian ce xi tong yan jiu
wang hong yuan ; zeng chuan zuo
..............page:144-145
RTEMS Real Time Operating System
zhou hong-bo (department of information and electricity engineering; shaoyang university; shaoyang 422000; china)
..............page:14-15
tui jian xi tong yan jiu zong shu
wang gai fen
..............page:68-70
Network Lab Building and Experimental Teaching of Computer Network Course
ouyang yong; wang jing-jing (hubei university of technology; wuhan 430068; china)
..............page:150-151
Implementation of Video Surveillance and Monitoring System Based on IP Multicast Technology
yang da-quan; zuo cong-ju; zhao shi-qing; liu wei-wei (school of information science and engineering; shenyang university of technology; shenyang 110023; china)
..............page:74-76
Establishment of Information Communication Management in Software Deuelopment Project
xu zhi-ying1; teng teng2 (1 wuhan km information technoloty co.; ltd; wuhan 430223; china; 2 capital uniuersity of economics and business; beijing 10070; china)
..............page:81-82
ge xing hua xing zheng guan li xin xi xi tong de she ji yu shi xian
zhang li min ; zhong zuo ; li zuo
..............page:83-84
shuang ji neng li ce shi ji suan ji fu zhu xi tong de she ji
li jun ; niu zuo
..............page:87-89
EJB Technology and Its Development Advantage in WebGIS
yang jian-hong (department of computer; wuhan polytechnic university ; wuhan 430021; china)
..............page:99-101
Realization of AES Encryption Arithmetic
wan hang (information engineering institute; china university of geosciences; wuhan 430074; china)
..............page:130-132