Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2008 Issue 12
ji yu td8.0 de ce shi guan li yan jiu
yang zuo
..............page:34-35
vb shu ju ku zhong ado fang wen ji shu yan jiu
li yue jun ; xu lei
..............page:43-44
cheng xu de xing neng yu bian cheng yu yan
jiang zhen
..............page:58-59
Design and Implementation of Snmp Agent Based on FS8610 Chip
xie ying zuo
..............page:64-65
xin xing xing zai cheng xu cun chu qi yan jiu yu shi xian
zhu zhou rong ; zhang jian
..............page:62-63
ji yu fs7802 de smart card reader she ji yu shi xian
you zhi ming
..............page:66-67
ji yu ria mo xing de yi liao jian yan xin xi xi tong yan jiu
lin yu hang ; liu zuo he
..............page:70-72
Configuration of VLAN Based on Port
zhu zuo
..............page:133-134
yi zhong ji yu owl de zhi neng wang zhan xi tong yan jiu
li hai long ; li qing ; li jun
..............page:122-124
ru qin jian ce ji shu yan jiu yu tan tao
su xue ; zhang li ping
..............page:154-156
Implementation of Loop Control in EPON System
ma xu ming
..............page:139-141
jian gou zhu yi li lun zai ji suan ji wang luo ke cheng jiao xue zhong de yun yong
yi yun fei ; zhang sen fan ; wu qi ming
..............page:203-204
ji yu mapgis tu di li yong shu ju ku guan li xi tong de she ji
tao nian wang
..............page:182-183
Design and Implementation of Telecom Project Drawing Edit Module
xu zuo ; peng yu hui ; ye yu qiang
..............page:196-198
xin xi an quan feng xian ping gu fang fa de yan jiu
you fan
..............page:164-165
Data Inquires Method in Java
ye wen sheng ; man xue zuo
..............page:188-189
chang jian wang luo an quan gong fang ce lue
wang guo hai ; tang zhi li
..............page:156-158
ji yu jsp de b2c dian zi shang wu wang zhan gou jian
sun min yan ; huang li
..............page:152-153
web service zhong an quan ji shu de yan jiu yu shi xian
huang chun fang
..............page:159-160
Cryptography Technique for Network Security
zhang li
..............page:176-177
ji yu iconix fang fa de o&m jia gou she ji yu fen xi
cui xiao yan ; yuan gang
..............page:22-23
ji yu nei rong te zheng de duo mei ti shu ju ku jian suo fang fa yan jiu
jiao an quan ; zhong sheng
..............page:180-181
xiao yuan wang zhong bind yu ming fu wu qi de shi xian
li xiao bin ; li shu zhen
..............page:144-146
Design and Realization of Teaching Evaluation System Based on ASP.NET
xiao kui ; wu tian ji
..............page:142-143
Study on Distributed-based Intrusion Detection
cai ming ; zhang cheng jun
..............page:161-163
soa ji shu zai dian xin xi tong zhong de ying yong
ke cheng ye
..............page:83-84
Research on Ant Colony Algorithm for Solving Multi-dimension Package Problem
zhang qin ; gong hong zuo
..............page:49-51
ruan jian ben di hua ce shi yan jiu
hu xiao zuo
..............page:30-31
feng li fa dian zhong de feng neng zi yuan ping gu fen xi ruan jian yan jiu
liu chang ; shu sheng wen ; song bin
..............page:20-21
cmmi mo xing zhong xiang mu gan xi ren guan li yan jiu
di hong bao
..............page:16-17
ruan jian kai fa xiang mu jian yi guan li fa
lin feng sheng ; xu fang
..............page:5-6
wang ge ji suan zhong ren wu diao du ce lue yan jiu
xu guang nan
..............page:137-139
ji yu netpipe de wang luo liu liang ce liang yu fen xi
yao ming
..............page:150-151
web jie gou wa jue zai sou suo yin qing zhong de ying yong
pang min ; zhou hai ying
..............page:129-130
Research on Online Web Construction Based on J2EE
wang wen zheng
..............page:131-132
wu yue shu de li zi qun you hua suan fa
zhou kai
..............page:45-46
du li xue yuan shu zi hua xiao yuan jian she de yan jiu yu shi xian
li li fen ; zhang qiu ju ; yun cai xia
..............page:3-4
zhuan jia xi tong zong shu
bi xue gong ; hang ying qiu ; li zuo ; zhou jin dong ; huang zhi cheng
..............page:7-9
yi zhong ji yu dwt de cai se shui yin suan fa
xiao zhi liang ; dong fang
..............page:47-49
Research of Wireless LAN Security Technology
cheng sheng jun ; han gui hua
..............page:173-175
gou jian arm-linux qian ru shi bian yi qi
cai li ping
..............page:112-115
Research and Design of Exploration Data Management System Based on MapGIS
chen ye ; fan wen you
..............page:109-111
yi zhong ji yu logistic ying she de tu xiang jia mi suan fa
yuan shu xiong
..............page:39-40
Application of Geostatistical Interpolation Method in ArcGIS
wang yan ni ; xie jin mei ; guo xiang
..............page:36-38
Realization of Loading Assembly Technology Base on Java 3D
li yun ; liu min
..............page:27-29
shen ru du qu san ling fx xi lie plc cheng xu bian xie
ma zhi gang ; jia yu qin
..............page:81-82
yi zhong ji yu arm7 de yi tai wang tong xin she ji
zou zuo ; wang guang jun ; zhang ya juan
..............page:120-122
yi bu wei tuo ji shu zai ji chang huo yun xi tong zhong de ying yong
wang xiong ; du ya jiang ; lei bin
..............page:97-99
Research On Worm Characteristics and Working Principle
ning hui
..............page:166-167
Research of Image Matching Method Based on Evolutionary Algorithms
hu tao ; zuo jing feng
..............page:192-193
mediator mo shi zai deng lu jie mian zhong de ying yong
zhu jin song
..............page:118-119
lv bo suan fa zai ce jing shu ju yu chu li zhong de ying yong
cheng shi qing ; ma xun fei ; wang ying
..............page:56-57
Application of STC12C2052AD Single Chip in Development of Smart Sensor
zhao shi ping ; wang sai
..............page:75-76
Development of Wireless Meal Points System
lin li qiao
..............page:87-88
Design of JBoss Rules Rule Engine Program
wu yong jun ; zhang yan ; jin guang ming ; wang you jian
..............page:24-25
ji yu ben ti yu yan owl luo ji yu yi yu tui li de yan jiu
wu qin xia ; zhao hong dan
..............page:41-42
san wei shi ti zao xing miao shu fang fa bi jiao yan jiu
lu rui ; wang gai fen
..............page:190-191
yi dong shu ju ku de yan jiu yu ying yong
liu yang
..............page:184-185
ruan jiao huan gu zhang guan li shi shi zhong de wen ti ji qi gai jin
wu wei min ; qin jun
..............page:13-15
ji yu c/s de yuan cheng jian kong ji shu yan jiu
zeng liang ; zuo jun
..............page:104-106
wu xian ju yu wang an quan gai shu
liu pei ; luo zhen jun ; liu yang
..............page:178-179
ji yu mapgis de guo tu zi yuan dian zi zheng wu xi tong she ji
huang yun bo ; du rong li
..............page:85-86
ji yu gai jin hou de vq shuo hua ren shi bie xi tong yan jiu
luo li ; zhang you chun
..............page:77-78
vrml zai wang luo shi yan jiao xue zhong de ying yong yan jiu
yang ya rang ; liu shi jin ; wei ji tao
..............page:207-209
wang luo ban ke jian you hua fang fa
zhou wan ; zhou cai xue
..............page:205-206
ji yu mapxtreme2004 de ying yan ji shu yan jiu
pan wan min ; xu ying zhuo ; wang liu peng
..............page:95-96
Design and Realization of Laboratory Management System
zhang hong
..............page:92-94
A Method of Forecasting Bug in Black-box Testing
shao jun ; feng jian ; li ding jun
..............page:10-12
ke shi hua ruan jian zai wu li jiao xue zhong de ying yong
zhang min rui ; li ling yun
..............page:199-200
ji yu cun chu guo cheng de shu ju kuai su fen ye fang fa
chen huan tong ; chen yao zuo
..............page:18-19