Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2008 Issue 7
Research on the Copyright Protection Technologies
wang xian de ; wang wei chao
..............page:30-31
Design of USB Data Acquisition System Based on SCM
li bo ; zu jing
..............page:99-101
Study on the Application of Java's Polymorphism
liu fan yan
..............page:63-65
visual c~(++) shu ju ku bian cheng zai kuang shan xi tong zhong de ying yong
kong fan min ; mao ji guo ; sheng cheng guang
..............page:108-109
shi shi shu ju ku diao du ce lue yan jiu
zhang jie
..............page:95-96
samba fu wu qi de pei zhi
fu xiao juan
..............page:89,91
lu you xie yi shi xian wang luo zhong fei deng jia fu zai ping heng
yang xiao zuo ; xia chao qun
..............page:79,82
Bank Networking Scheme Based on the GPRS Wireless Network
wang ke an
..............page:77-78
ji yu yi dong agent zhi neng dao xue xi tong mo xing
li gang ; yin zuo you ; zhou liang
..............page:80-82
Research on the Principle and Application of Web Search Engine
yang jing ; lv tian jun ; jiang zhan sheng
..............page:86-88
web wa jue ji shu zai wang luo ke jian zhong de ying yong
liu ran ; bu hui
..............page:75-76
Research of Internet access based on Ad Hoc network with Mobile IPv6
li juan ; sui peng ; du min she
..............page:72-74
yi liu xi tong de ping jia fang fa yu gai zao ce lue
zong mei ling
..............page:34-35
Information Retrieval Based on XPath
chen zuo
..............page:27-29
Design of Two Level Keyword Search Component in Lan
wang he zuo
..............page:70-71
chou yang zai shu ju wa jue zhong de ying yong
liu li ; wang chun zhi
..............page:97-98
Design and Implementation of Process Mining System Based on α- Algorithm
liu zuo ; jiang ming hu
..............page:66-69
zui you wang guan xuan ze jelger suan fa de gai jin yan jiu
yang chang chun
..............page:56-57
Realization of SSO System Based on Java
yang yan ming
..............page:45-47
Analysis of the Client Software Structure
he yang
..............page:36-38
ji yu rong he suan fa de huo zai yuan cheng jian kong bao jing xi tong she ji
sun ning ; liu xin wei ; zhao yin
..............page:54-55
Realization of Video Recorder Program Using OpenCV
zhou qian jin ; xiang zheng quan
..............page:41-42
dong tai gui hua fang fa zai ke yan ji jin fen pei zhong de ying yong yan jiu
ding yao yao ; gu bao lei
..............page:39-40
Probe into Web Examination System
li guang jie
..............page:20-21
KPI Analysis in Life Insurance Operation Management Based on Data Mining
huang hui chao ; zhang xiao long
..............page:102-104,107
Study on the Application of Data Warehouse in CRM
liu zhen ; xiong jian min ; tan bao hua
..............page:105-107
Mobile Platform Oriented AHD Compression
zhang dan yang ; fan wen you
..............page:83-85
jie jue ip di zhi hao jin de cuo shi
deng hao ; yang jun
..............page:90-91
chord cha xun xie yi fen xi
feng zuo
..............page:12-14
li kong zu tai ruan jian zai xin xing ban ka shi dcs xi tong zhong de ying yong
zhang zu ying ; meng fei ; qian jin
..............page:18-19
wang luo shu ju ku sql server de an quan ji you hua
chai xu qing ; xia liang
..............page:197-199
ji yu er wei ma ji shu de she hui xin yong xin xi guan li xi tong tan tao
dong li juan ; zhang yong mei
..............page:32-33
shu zi shui yin de suan fa yu ying yong
liu ze ping ; long jun bo
..............page:58-59
guo wai yin xing de shu ju cang ku qian yi ce lue
xiao zuo ; shen zuo quan
..............page:110-111
Research of Machine Gambling and Searching Algorithm
zhang zhen ; pang hai
..............page:48-50
ji yu gef de ke shi hua bian ji qi kai fa
liu jia
..............page:131-133
ji yu yue jian gai nian ge de guan lian gui ze wa jue suan fa
li qi ; zhao chao
..............page:165-166
Application of Flash Technology in Computer Teaching
liu zuo ; shen ze gang ; liu yang
..............page:174-175
ke bian cheng yi bu chuan xing tong xin jie kou de she ji
yang biao ; shen yuan long
..............page:162-164
xin xi yin cang ji shu yan jiu
peng xiu mei
..............page:195-196
Cross Developing Environment of Embedded Linux
ding xiao bo
..............page:144-146
Design of Clinician Intelligent Prescription System
chen pei zheng ; zhou zuo ; zhang hao ming
..............page:141-143
lun duo mei ti dian jiao shi de she ji yu shi xian
liang guo qiang
..............page:151-152
Design of Step Motor Control System
zheng zhi cong
..............page:136-138
Design of Anonymous Information Platform
li lan cui ; meng bo
..............page:124-125
ji yu objectarx de gong cheng zhi tu kao shi xi tong
zuo chao ; zhou jing wei
..............page:122-123
ru qin you pian xi tong zhong xu ni lu you xuan ze mo kuai de she ji yu shi xian
ruan zhong ; yang yun feng
..............page:178-180
dian li xi tong jian ce zhong wei chu li qi cheng xu shi xiao wen ti ji jie jue fang an yan jiu
liu tao ; zhang zi peng ; wang shu qing
..............page:126-127,130
Technologies of DDoS Attack and Defense
wang bo
..............page:189-190
zu jian ji shu zai mo ni fang zhen xi tong zhong de ying yong
he shao hua ; yang kai
..............page:167-168
Application of the Comparison Method in C Programming Design Teaching
pan jun tao ; pan xiao ming
..............page:169-170
Design of Railway Equipments Management System Based on GIS
gong ju ming
..............page:155-156
Reseach of Programme Passing Based on XML
ma xiao jing
..............page:15-17
Security Assessment Method of Informatioin System Based on Combating Crime
zhang jia shen ; li zheng xiang ; li qiang
..............page:193-194
License Plate Location on the basis of Mathematical Morphology and Transcendent Knowledge
wang jun jie ; fu xiao hong ; li jun jie
..............page:9-11
Investigation of .NET Product Developing Method Based on MVC Design Mode
deng yong jun ; dai jian wei
..............page:157-159
jie xi initramfs ji zhi zai qian ru shi linux xi tong zhong de ying yong
yu xiao feng ; zhu hong
..............page:147-148
mapgis shi zheng she shi guan li ping tai
zhang zhong gui ; zeng wen
..............page:153-154
Design and Application of E-Commerce Security Scheme on Campus Network
zuo yue ; qiao shan
..............page:183-184
yi yuan wang luo de an quan guan li
wang zuo
..............page:187-188
arp qi pian yuan li yu fang fan ce lue
li lin ; yi yun fei ; zuo jun
..............page:185-186