Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2009 Issue 2
ARP Principle Agreement to Deceive and Defense Measures
wu liya
..............page:147-149
Network Security System and Firewall Technology
yang bo
..............page:143-144
yi zhong ji yu opnet de wang luo ban shi wu fang zhen fang fa yan jiu
liu zuo ; gu xiao ming ; kuang xiao
..............page:125-127
wang shang xiao shou chang wen wen da xi tong de gou jian
wang bo ; xue zuo mei
..............page:112-113
vc yu fortran hun he bian cheng ji shu shi xian
zhou lin li
..............page:35-36
Comparison on Algorithm Strategy
wan chen she yongqin
..............page:39-40
gou jian hua ruan jian kai fa tan jiu
cheng yi ; qin bin
..............page:30-31
zhi wen yu chu li suan fa yan jiu
liu hong mei
..............page:37-38
A 1V 1.9GHz Low Noise Amplifier with Q-inhancement circuit
wang hui ; chen bing
..............page:100-102
yao dian guan li xin xi xi tong de fen xi yu she ji
huang yu
..............page:97-99
Analysis and Design of Credit Information System
zhang nan ping ; zhang teng fei
..............page:91-93
Concept Analysis in Informatization of Library
zheng ding
..............page:83-85
Application of (s,S) Book Strategy on Random Store Model
zhang wen guo ; wang xiang
..............page:94-96
Implementation of IGMP Snooping Based on Linux Kernel Module
zhang yuan long
..............page:88-90
Application of MPEG-7 Standard in Multimedia Information
dong leilei
..............page:72-74
Problems and Countermeasures of Learning Protel99SE
zhang juan
..............page:77-78
Design of an Ethernet Interface Based on ARM
chen yu
..............page:134-136
ji suan ji wang luo xu ni shi yan tan xi
gu jin jiang ; chen zhang qi
..............page:128-129
The key technology of building a business VoIP
zhang xianqiu li qiangqiang
..............page:132-134
Study on the Routing Protocols in Wireless Mesh network
jie zuo
..............page:137-138
fen bu shi dui xiang ji shu fen xi ji qi fa zhan yan jiu
zhang yang xiang
..............page:139-140
sql server shu ju ku an quan cuo shi jie xi yu ying yong
he han hua
..............page:141-142
wang luo zhi zhu sou suo ji ben ce lue yan jiu
zhao gen
..............page:130-131
xml de yan jiu yu fa zhan
ke rui
..............page:3-5
Genetic Algorithm Based on Function Optimization
liu huanxiang
..............page:44-46
da xing huo dong de ji suan ji fang zhen yan jiu
zuo li ; wang bo
..............page:55-56
si nie er ding lv shu zi mo xing de she ji
chen lin
..............page:9-10
Research on the Constructor Function in the C++ Language
zhang lin mei
..............page:60-62
Research and optimize on Inserting batch data into Oracle
liu hong ; fan qing gang
..............page:164-166
Automatic Moving Object Segmentation in Diving Video Sequences
li tao ; gu bao ping
..............page:182-184
Research and Improvement on the Decision Tree Classification Algorithm of Data Mining
dan xiaorong chen xuanshu liu fei et al.
..............page:41-43
Research on kernel packet capture based on Linux
fu yang wang jiazhen wen jiafu
..............page:154-156
ipv6 de an quan xing yan jiu
zhang yong ping ; wang qing xian
..............page:145-146
Problems and Countermeasures of Computer Network Security
gong zuo
..............page:150-151
ura97 mo xing de fen xi yu gai jin
chen yu ; chen jing
..............page:167-168
Discussion on Polymorphism in C++ Language
zhang zuo
..............page:65-66
Design and Realization of Three-party Based Storage Backup System
zhang guanghua li xiaohong
..............page:157-159
ji yu shen jing wang luo de xiao yuan wang ru qin jian ce xi tong jian she
du xiao zuo ; long da ya
..............page:152-153
A pilot Study in CMMI Implementation
yi shasha
..............page:22-23
Application of Software Testing in Software Development Process
zhong shaocong peng jin
..............page:19-21
Research and Application of Decorator Pattern
huang yongpeng
..............page:14-16
mian xiang dui xiang shu ju ku ji shu ji qi qian jing fen xi
zhu ya zuo ; mao guo ping ; sun sheng jun
..............page:162-164
Route layout in complicated landform with the Ant Colony Optimization
niu xiao dan ; zhu xiao guang
..............page:50-51
word cao zuo ti ji suan ji zi dong chu ti de she ji yu shi xian
huang qin fang
..............page:198-199
Video Watermarking Combining with Hybrid Coding
wan shu zhen
..............page:174-176
ji yu geomine3d de san wei di zhi jian mo
liu hui ; zhao jiang nan
..............page:177-179
Research on Queries of Inconsistent Databases
tang song
..............page:171-173
Realization of Digital Freguency Measurement System Based on FPGA
zeng guang ; feng rui
..............page:28-29
Research on Method of Program Correctness Proofs
su min ; ding zhi yi
..............page:24-27
Application of XML in E-Commerce
peng yanong
..............page:6-8
Application of VML in ArcIMS
cheng yong ; gao shan
..............page:189-190