Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2009 Issue 10
ji suan ji wang luo guan li ji shu ji qi ying yong
zheng jia xiang
..............page:141-142
Changsha Mobile Network Optimization Based on Tabu Algorithm
deng de ; bian nai zheng
..............page:130-132
xiao yuan wang bt kong zhi fen xi yu ce lue
ni bo
..............page:125-126
Treatment of Network Fault
xia fa lin
..............page:123-124
Research on Tactical Communication Network Frequency Plan Based on GIS
liu sheng ; li jing jing ; pang gao jie
..............page:114-116
ji yu web fu wu de dian zi zheng wu xi tong yan jiu
zhang li ping ; zhao yi
..............page:135-136
Research on Computer Network Management Technologies
zhang li
..............page:120-122
Rearch of DNS Based on Red Hat Linux9
gao yuan
..............page:150-152
Application Research of Non-disk Boot Technology in Network Clone
xia liang ; xie bao ling
..............page:148-149
xie tong tian xian xi tong de jian mo yan jiu
zhang xiu feng ; zhang jin zhu
..............page:139-141
yi dong piao quan jiao yi xi tong de xie yi she ji
tao jian sheng
..............page:146-147
Building Enterprise Information Portal Based on JetSpeed
huang ji ping ; zhang dong ; miao hua
..............page:143-145
Anonymous Secure one-hop Communication Scheme in MANET
wu zheng nan ; cheng yuan sheng
..............page:155-157
Research of Enterprise Information Service Security Assurance Method
li ling zhi ; lan xu hui ; chen jin song
..............page:167-168
Idea of GA Optimization of Neural Network
li ya zuo ; zou kuan cheng ; li yan hui
..............page:56-58
NewYAWL:A Cloured Petri Nets Based on Workflow Language and Its Evolution Process
wu xian yang ; shen wen wu ; gong ke
..............page:58-60
J2ME-based Application platform and Development
zhang zuo
..............page:53-55
Exploration of Computer Network Security Technology
su xiao
..............page:160-161
ji suan ji wang luo xin xi an quan ji fang hu cuo shi
zhou zuo
..............page:162-163
Analysis of Computer Network Security Issues
shi bo feng
..............page:158-159
chong zuo di qu cdma wang luo you hua fen xi
lei jin hui ; du liu feng
..............page:153-154
yi dao cheng xu she ji ti de suan tian ku la
ding jian bing
..............page:197-198
Application of VMware in the Computer Experiment Teaching
hao shang fu ; liu jian jun ; wang yuan qiang
..............page:189-190
Analysis and Design of Mobile Database
gao wei hua ; lan zuo fei ; wang wei
..............page:175-177
Application of Wavelet Transformation in Time Synchronization
xu ding jie ; ye zeng ; huang ping ; zhang xiao long
..............page:172-174
tu wen sheng chan guan li xi tong de she ji yu shi xian
wang yun chang ; wang jian zuo ; li rui
..............page:180-181
yi zhong gao xiao de ji yu shen fen de dai li qian ming fang an
shu lei ; chen zai xing
..............page:164-166
A Dynamic International Solution of Swing Components
xiao rong
..............page:22-23
An Analysis Method of the Risk of IT Project Based on Ruogh set and AHP
qin dai zuo ; liu bing xiang
..............page:24-26
zai yu zhong ji yu zu ce lue de ruan jian bu shu
chen qi ; zheng jun hong
..............page:27-29
Research and Application of NM Computing Mode
li zhong nian ; dong zuo ; zhang ning
..............page:43-45
Summary of Routing Protocol for Wireless Mesh Network
zhang li li ; wang wei hua
..............page:73-75
yi zhong ji yu wcf dui deng wang luo de bing xing ji suan huan jing
xu hong zuo ; pan wu ming
..............page:133-134
Method of Association Rules Mining Based on Genetic Algorithms
yu xiao shuang ; jiang ming hua
..............page:64-66
ji yu mda de gong zuo liu jian mo kuang jia
wei ge
..............page:49-50
Kernel Operation Based on Binary Relation
zhang qiang
..............page:51-52
Data Processing For Decision Trees
huang xiong ; song zhong shan ; liu shao ying
..............page:32-35
Metrics and Models in Software Quality Engineering
li qi fang
..............page:46-48
Research and Application of Multithreading Technology Based on Qt
huang yu dong ; hu yue ming ; chen an
..............page:40-42
altas yi bu xin xi fu wu tan jiu
sun bin ; wang dong
..............page:38-39
ji yu ejb ti xi jie gou de kai fa mo xing yan jiu
wang jing ; huang quan zhou
..............page:36-37
Research on WinCC Monitor System Based on XML
hu ming ; hu fan
..............page:29-31
Features and Application of Cloud Computing
zhong chen zuo
..............page:3-5
Research on Internal Sort Methods of Data Structure
wang hai yan
..............page:15-16
Discussion on the Teaching of Operating System
wang qiu fen ; zhang qiu hong
..............page:195-196
Reform of Non-special Basic Teaching of Computer
gao jing ; zhang kai bian
..............page:191-192
ns-3 xia xin dui lie guan li mo kuai de shi xian
chen xin zuo ; lv guang hong
..............page:19-21
ji yu wf gong zuo liu de asp.net cheng xu she ji
gong hong ping
..............page:17-19
Application Research on Permission Management of MOSS
zhang yong jian
..............page:169-171
struts2 kuang jia de quan xian kong zhi yan jiu
wang yan tong ; hao ping
..............page:13-14
yi dong xu ni xue xi she qu chu tan
deng wei ; liao tao
..............page:184-185
Application of MVC Model in Commercial Banking System
peng wei ; ni de ming
..............page:102-104
xue ji guan li xi tong de yan bian yu chuang xin zhan wang
li mei zhen
..............page:100-101
qi ye duan xin fu wu ping tai de she ji
wang hui qing ; chen zuo qiang
..............page:112-113
jin chu kou qi ye kua jing zi jin liu dong fu zhu xi tong
xiao shao zhang
..............page:110-111
yi zhong ji yu fen duan de mpls wang luo ke sheng cun xing ce lue
shi yong ; zou zi li
..............page:117-119
Bank Account Management Programming Based on CORBA
wang bo ; sun wei
..............page:107-109
ji yu gou zi ji shu de jian pan yin le xi tong yan jiu
tong qiu yan ; wu ke wen
..............page:91-93
Strengthening Monitor Power Management in Network Examination by Registry
ke zun ping ; liu xiang yang ; li ming ; jiang yan
..............page:88-89
An Improved Method for Minimum Distance Classify:NN-MDC
guo ya qin ; wang xing zhou
..............page:97-99
ji yu .net ping tai de nong ye dian zi zheng wu xi tong yan jiu
wan rong ze ; song ling ; shen pei jian
..............page:94-96
mo hu kong zhi ji shu zai ye jin gong ye zhong de ying yong
ding xiao mei ; lian bin zhong
..............page:86-87