Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2008 Issue 10
shi shi diao du suan fa zong shu
zhang li li ; zhang feng
..............page:62-63
Research on HowNet Based Algorithm of Building Chinese Lexical Chains
zhang ming bao ; xie zong wang
..............page:51-53
ji yu web de dian zi zheng wu shi jian jiao xue ping tai de gou jian
pu ming qiang ; dong cheng jian
..............page:75-76
shen jing wang luo mo shi shi bie
geng guan hong ; sun wei ; luo pei
..............page:81-83
ling yu zhi shi zai deep web shu ju chou qu zhong de ying yong
xu wen zhi ; mu bin
..............page:86-87
Study on Enterprise Application Integration Architecture Based on Web Service
li liang ; xia shi xiong
..............page:72-74
A New Method of Data Mining-Support Vector Machines
luo na
..............page:30-31
Research of Mallat Algorithm Based on Multi-Resolution Analysis
zhou kai ; wu dan
..............page:54-55
Comparison of Algorithm Based on Traveling Jalesman Problem
liu zhao qing
..............page:59-61
Introductions of LOD and Its Algorithms
shao yan hong
..............page:48-50
Reserch on Topology of Algorithms in NMS
li you
..............page:35-36
Application of Multithreading Techniqiue in the Development of Embedded Debug Tool
guo shen ping ; zuo zhi gui
..............page:42-45
yi zhong ji yu fu he xing li zi qun suan fa de gai jin k-means ju lei suan fa
yi yun fei ; wu qi ming ; tang feng xian
..............page:46-48
Application of Data Mining Technology in Teaching Management
lv zuo ; lin yu lian
..............page:106-108
ji yu c~# de zhi zhen shi shi zhong zhi zuo dao yuan bing tu she ji
zhang wei ; dai jie qiang
..............page:64-66
Application of Digital Clock Based on AT89S52 SCM
zhang fang
..............page:120-122
ji yu winpcap de hai liang shu ju jie shou yu bao cun
chen yan ; hao li rui
..............page:88-90
Black and White Processing to Color Images with C~(++) Builder
li rui xia ; zhou zuo
..............page:94-96
Process of Memory Read/Write Mistake in Windows XP
jia ming yong
..............page:104-105
wei kong ji shu duo mei ti ke jian zhi zuo tan tao
zheng yu li ; zhang qian
..............page:99-101
Research on Database Techniques in CSCL System
yuan yuan
..............page:91-93
kai fang shi dong hua de zhi zuo fang fa
wang pei pei
..............page:97-98
ji yu svg ji shu zai webgis zhong ying yong yan jiu
pan wan min ; xu ying zhuo
..............page:84-85
yi dong agent ji shu yan jiu
chen xiao xiang
..............page:69-71
A Distributing Network Flowing Inspect System
ke dong liang ; ni ai ling
..............page:153-155
xiao yuan wang luo xin xi an quan ji shu yan jiu
wang huai jie
..............page:189-191
zhi wen shi bie ji shu de xian zhuang yu fa zhan
yang wen shan
..............page:187-188
access shu ju ku de an quan
huang cheng
..............page:183-184
mpeg-2 chuan shu liu jie fu yong de ruan jian shi xian
huang zuo peng ; liu dan ; hu rong
..............page:150-152
Design of Park GIS Data Management System
li min
..............page:156-157
qi che fa dong ji gu zhang zhen duan zhuan jia xi tong de she ji
hu zuo ; tang zuo
..............page:140-141
Detecting and Defendable Policy of Botnet
li xiao zuo ; wu de gang
..............page:195-197
Network and Information Security Management
wu xu rong
..............page:191-192
yong verilog she ji shi xian yi bu shuang xiang ji shu qi
sun bo ; wu liang
..............page:118-120
obex tong xin xie yi qian xi
yuan ren shun
..............page:67-68
A Job-Driven Software Development Introduction
zhao zuo
..............page:24-26
ruan jian ce shi ce lue zong shu
lin hai ; ou gang ; xiang wei
..............page:3-4
ji suan ji wang luo an quan ji fang fan ji shu tan tao
yang yi duo
..............page:198-199
Study on Encrypted Chaotic Technology
wang xin wei
..............page:193-194
Ten Protective Measures of Computer Password Security
hu jin yu
..............page:175-176
ji yu matlab de fft pin pu fen xi ji iir shu zi lv bo qi she ji
dong jing zuo ; yu guang yan
..............page:128-129
ji yu qian ru shi ping tai de che zai yuan cheng jian kong xi tong
xu li sha ; zhou guo rong ; liu yan
..............page:145-147
Analysis and Prospect on Data Inquiry Arithmetic of Wireless Sensor Network
yan wei zhong ; zhu qiao ming
..............page:77-78
shu ju bei fen xi tong fen xi ji qi ruan jian she ji
tian hao qiu ; yuan yuan ; zhou rui
..............page:15-17
ji yu vmware huan jing xia wang luo mo ni ruan jian ns2 de an zhuang
pan xiao ming ; guo xiao feng ; wu jian sheng
..............page:13-15
ji yu fen bu shi ha xi biao de p2p xi tong an quan yan jiu
chen song le ; sun zhi xin
..............page:185-186
fang fan dns qi pian de ce lue
li han ; luo xin hua
..............page:177-178
Discussion on Human Resources Management Informatiation
zhang hong yan ; yang hai
..............page:134-135
Research and Implementation of Online Selecting Subject of Physical Experiment
wang yue ming ; liu guan yuan ; jin wei ; yang you song ; wang rui li
..............page:171-172