Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2009 Issue 9
Research of Encryption Algorithm Based on Computer Network
chen xuezhao yang jie
..............page:68-70
Basic Principle and Application Research of Genetic Algorithm
zeng wenfei zhang yingjie yan ling
..............page:54-56
dct ji idct suan fa zhong zui you hua zi chang yan jiu
liu qiong ; ou yang wan li ; xiao chuang bai
..............page:71-74
yi zhong ji yu shou suo yin zi de gai jin li zi qun suan fa
yi yun fei ; chen guo hong
..............page:59-60
ji yu soa de bian dian zhan zi dong hua xi tong ji cheng she ji yu shi xian
cheng hua ; liu pin ; cheng ting hui ; liu min
..............page:75-76
Continuous Integration System Based On OSGI
zhang ya nan
..............page:32-33
Meta-data Mechanism in Java and Its Applications
yu qiuhui
..............page:64-65
Analysis of PKI/PMI Technology
liang song bai ; liu yan
..............page:41-43
Scheduling and Allocation of Production Line with Real-time Data Streams
hu hai jun ; qu jia peng ; zhu han chao ; zhang xiao long
..............page:81-83
ji yu cmpp xie yi de qi ye duan xiao xi fu wu xi tong
yi jun hong
..............page:93-94
Application of Airline Distribution Systems in E-commerce
zhao xiao fei
..............page:97-99
Maintenance and Management of Computer Laboratories
su yu lei ; xue fang
..............page:100-101
webgis zai cheng shi jiao yu xin xi hua zhong de shen hua ying yong
gong fa ya ; lin feng ; wu liang wen
..............page:113-114
guo jia ji suan ji deng ji shang ji kao shi xi tong
liu ji ; deng qiang ting
..............page:111-112
Internetwork Communication Based on UDP Protocol by Using Socket
wang wei ; lan zuo fei ; gao wei hua
..............page:115-117
Computation of Qos Admission Control Based on Cascade Filtration
zhao yi ; zhang li ping
..............page:61-63
Research on Multi-layer Architecture on ASP.NET Platform
yang yuqin wu maochang
..............page:123-125
ip wang luo xia gou jian shi pin hui yi xi tong ji shu tan xi
zheng jia xiang
..............page:130-131
an quan xin xi ping tai de shu xing yan jiu
li lan cui ; meng bo
..............page:143-144
zong he bu xian xi tong de yan jiu
li bi xiong
..............page:91-92
yi zhong wen ben wu jian du te zheng xuan ze fang fa
xin ying mei ; sun zhi hui
..............page:9-11
yi gou fen bu shi shu ju cha xun xi tong she ji fen xi
xu you ming
..............page:154-155
Application Research of Fine-grained Access to Database
yu gang
..............page:145-147
qian ming zhong qian ru yong hu shen fen xin xi de gong ping he tong qian shu xie yi
yang jing hua ; li hua zhong
..............page:140-142
dian zi shang wu an quan yu ca ren zheng tan tao
yang yi bo
..............page:134-136
Design and Application of Teledata Service System Based on GPRS
wang zheng hao ; li jin
..............page:109-110
Object-oriented Software Regression Testing Methods
yuan haigen li hongli
..............page:16-17
Simulation Method of SVPWM Based on Matlab/S-function
zheng lei ; cui yu long
..............page:27-29
Application of Digital Watermark Technology in Safety of E-commerce
peng xushan qin weidong wu yanyan
..............page:137-139
windows server 2008 zhong de xu ni hua ji shu tan xi
chen qi ; zheng jun hong
..............page:39-40
Development of Middleware Technology
fu chun
..............page:7-8
Behavior Identity Based on Optical Flow Computations
gao wen jian
..............page:18-19
kai yuan nei rong guan li xi tong dotnetnuke de yan jiu
wang shi hui ; tong xiao gang
..............page:34-35
yun ji suan ji shu xian zhuang yu fa zhan qu shi fen xi
hu hui ; wang hui
..............page:3-4
ji yu windows de moodle ping tai da jian
ren hai tao
..............page:25-26
zhi shi ku xi tong yuan li tan tao
liu bing ; shen li hong ; li tao
..............page:148-149
Association Rule Mining for Privacy Protection Based on Sharing
wang xiao gang ; hui zuo ; sun zhi hui
..............page:150-153
ji yu java ping tai de zhuan jia xi tong
he jie ; cheng yuan sheng
..............page:20-21
xian dai xin xi ji shu yu zuo wen jiao xue zheng he de mo shi tan suo
leng quan ; zhang li
..............page:191-193
Investigation on Optimization of 3D Mechanical Detail Drawing
feng xiaozhong fan ning yao jiansong
..............page:178-180
duo ceng c/s jie gou zhong de guan jian ji shu
xu zhong qiu ; li liang ju
..............page:14-15
Discussion about the Exploitation and Application of Database
wang haibo li hengsheng huang shizhu
..............page:167-168
chan pin shu ju guan li xi tong de ying yong ji cheng ji shu yan jiu
cui yan mei ; liu li ; li fa xin
..............page:162-164
Application of ICA's Two Architectures in Emotion Recognition
guo jianlin liu pengcheng
..............page:180-184
cyu yan cheng xu gong yong ti gai nian fen xi yu ying yong
zheng jun hong
..............page:196-197
Application and Analysis of Oracle Dynamic SQL4 Ways
yuan hong jie ; wei hong yu
..............page:173-175
shu zi tu xiang qu zao chu li dui bi yan jiu
huang liang yong
..............page:176-177
fen bu shi shu ju ku xi tong yan jiu
lai ling
..............page:169-170
shu ju wa jue zai dian xin ye zhong de ying yong
cai qiong ; liao zuo wen ; zhang zuo bing ; wang xiao wei
..............page:165-166
er zhi tu xiang de fen ceng jie gou
lin xin hui
..............page:185-186
Research of Data-mining Technology
zhang zuo
..............page:171-172