Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2008 Issue 9
ip cheng yu wang xi tong mo xing yu fang zhen yan jiu
yan yue lin ; zhu shan
..............page:74-75
xiao yuan wang ip di zhi chong tu jie jue fang fa
wu ya zuo
..............page:72-73
boson netsim zai gao zhi gao zhuan ji suan ji wang luo ke cheng jiao xue zhong de ying yong
pan xiao ming ; wu jian sheng ; guo xiao feng ; wen xin quan ; huang zhong qian ; feng wen jian ; meng li li
..............page:70-71
Campus Data Intergration With SOA
gao ; shi jian gang ; chen zuo
..............page:68-69
Semantic Web Service Composition Based on SHOP2 of HTN Planning System
li shu zhi ; liu jing hua ; zhou shi yuan
..............page:60-62
Research of Exception Handling of Java Language
wu jin xiu
..............page:51-52
prolog yu yan de kai fa yu yan jiu
ding feng li
..............page:45-46
Research on Software Reused Technology
du jian jun ; yao peng
..............page:37-39
ping tai wu guan de qian ru shi gui de she ji
song wei ning ; liu zheng
..............page:35-37
ji yu yue shu de guan lian wa jue ying yong yan jiu
luo zuo ling
..............page:18-19
Application of RBTree Algorithm
gao qing ; jiang fan
..............page:40-42
Reseach on the Comparison of SAKAI with MOODLE
di zuo
..............page:33-34
wang luo an quan ji shu yan jiu
xu tao
..............page:182-183
jin rong xin xi fu he ren cai pei yang tan suo
huang xiao tao ; wu chi
..............page:3-5
ji suan ji wang luo an quan yu fang fan tan xi
zhao hui
..............page:180-181
wang luo jiao xue zi yuan zhong de xian xing zu zhi zhe jiao xue ce lue de ying yong
zhang yu ling ; chen lei lei
..............page:171-172
gao zhi ji suan ji zhuan ye ji neng pei yang de yan jiu yu shi jian
li xing peng ; zhou jian xing
..............page:165-166
guan lian gui ze zai xue sheng ping jiao zhong de ying yong
hu yan ni ; liu shi jin
..............page:156-157
ji yu mpi de bing xing ji suan shi xian jacobi die dai
zhang wei ru ; pan wu ming
..............page:16-17
Research of Botnets
zhang wei
..............page:188-190
wu xian wang luo zhong gai jin tcp xing neng de liang zhong fang fa
yang jia zhen ; zhang yun
..............page:79-80
mian xiang dui xiang shu ju ku yan jiu
qiao shi quan ; zhang yong qiang ; zhao jin bao
..............page:83-85
zai c~# zhong shi yong ado.net jin xing shu ju ku kai fa
gao peng ; li yun fan ; che ji bin ; shao lei
..............page:86-88
yi zhong ji yu des suan fa de jia mi xi tong shi xian fang an
zhang jia ; wang tao
..............page:43-44
ji yu asp.net2.0 de web ge xing hua zi zhu xue xi yan jiu
wang wei nan ; wang zhong hua ; zhang ni
..............page:63-64
Study on the Method of Information Retrieving From Web Table
bao shi zhuang ; xu chao ; tan shou biao ; li zheng ping
..............page:65-67
ji yu opnet de p2p liu mei ti shu ju liu de fen xi yan jiu
wang zhen ling ; wang fu shan ; liu qing mei
..............page:88-90
yi qun suan fa de yan jiu jin zhan ji ying yong
liu cai yun ; chen zhong
..............page:49-50
jpeg2000 zhong ebcot suan fa de yan jiu
xia wen hao ; chen hong wei
..............page:55-56
ji yu da fen qi ji shu de jpeg2000 tu xiang ya suo xi tong she ji
hu cheng long ; he qiong
..............page:91-92
ji yu xin yi dai shi pin ya suo bian ma biao zhun h.264 de yan jiu
liu qing li ; tian xiu hua
..............page:93-95
Development of Network Running Index Prediction System
cui ya lin
..............page:76-78
xin xi ke shi hua tan tao
deng man ying
..............page:99-100
.net jia gou zhong ji yu delegate de lce ji shu tan xi
xiao yu chao
..............page:9-11
Study on Countermeasure of Enterprise Network Security
zhan ming yan
..............page:196-197
ji yu gabor lv bo he wen li fen xi de piao ju shou xie ti zi fu jian bie
chen nian ; li xiao xin ; xu ji hong ; shen zuo min
..............page:173-175
fen bu shi shu ju ku huan jing xia de shu ju an quan ce lue
huang chun ru
..............page:198-199
Monitor Strategy for Network Security
zhao wen juan ; li bo
..............page:194-195
em suan fa de yan jiu
zeng chuan zuo ; zhang zuo ; zhang jing jing ; wang hong yuan
..............page:97-98
ji yu ria mo xing de xian chang zong xian cai ji xi tong yan jiu
wang jun tao ; liu zuo he ; song ting xin
..............page:104-106
Analyzation of Data Security in Network Exmination System
zhang chun zuo
..............page:175-177
xu ni xian shi ji shu (vr) ji qi dui jiao yu wang luo you xi de ying xiang
zhou yong qiang ; wang zhong hua
..............page:31-32
Analyzation of the Security Technology in NGN
liu lei
..............page:191-193
Application of Data Digging in Finance of College
meng tao
..............page:14-15
dao yin xi tong fang an she ji ruan jian tan tao
fu kui sheng ; zhang xiao yang ; ding hai shan
..............page:12-13
wang luo an quan ce lue he wang luo fa gui ti xi jian she
huang hua wen
..............page:184-185
ji jian shi dian zi jiao an wei jiao shi jian ya
sun li feng ; liu wen ; wang xing hua ; qin ping ping
..............page:160-162
kong jian shu ju zai xian tu xing cha xun ji shu de yan jiu
li guo peng ; zheng gui zhou
..............page:101-103
fen bu shi shu ju ku tong bu jian ce fang fa tan tao
zhao peng fei ; he jie
..............page:81-82
Design of Number of Procedures Warming Control System Based on SCM
song jian yong ; zhang jin zhu
..............page:133-135
An Improved Model Based on Discernibility Matrix
chen ji ming
..............page:20-22
Study on Modified Algorithm For Symbol Timing Recovery
zheng zuo ; zuo han yu ; zou xiao qing
..............page:57-59
proteus zai dan pian ji she ji zhong de ying yong
yang wan hong
..............page:141-142
wlan zhong de shen fen ren zheng ji shu yan jiu
miao bin
..............page:186-187
Control Scheme Based on Atmega8 SCM Burden System
zhang ji guang ; zhang wei ; sun yue
..............page:153-155
Design of B2B E-commerce System
peng zhi qiang
..............page:151-152
ji yu matlab de yu yin xin hao jiang zao ji qi fen xi
zhou qian jin ; xu jun
..............page:95-96
ji yu windows xp zhu ti de jie mian huan fu ji shu
wan lian wen
..............page:142-143
liu shui xian ji shu ji bing xing ji suan zai gpu zhong de ying yong fen xi
liu jin juan ; zhang dong chen ; gong tian ning ; li tao
..............page:25-26
jiao xue ren wu shu ju cai ji xi tong de gou jian pai ke guan li zi xi tong
peng ju ping ; li jun qing
..............page:144-145
Developement of Video Conference System Based on JMF
du ya shan ; cui zhen xing
..............page:107-109
Development of Electric Power GIS Based on Component Technology
cheng yong ; gao shan
..............page:110-112
ruan jian ce shi chang jian wen ti ji wu qu fen xi
fu xiao ying
..............page:29-30
Application of Civil 3D and Vega in Expressway Simulation
wang fan ; lu qiu yu
..............page:114-116
ji yu c/s mo shi de ji fang pai ke xi tong kai fa
xie li ping ; peng bo
..............page:127-128
Realization of Online Examination Managment system
yang zhao bing
..............page:129-130
jie he duo zhong ding wei shou duan de zhi neng xun jian xi tong ying yong yan jiu
zhang ping ; liu bo ; huang wei
..............page:131-133
delphi zhong tong guo windows api huo qu ci pan can shu
yuan yuan ; liao fei fan ; wen feng
..............page:27-28