Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2010 Issue 2
Research on Accesses to Database by ADO in VB
wu qing lin ; wang zuo
..............page:151-152
Summary on Of CRM And Data Mining
gu xiao wen
..............page:145-146
shu ju wa jue ji qi zai qi ye zhong de ying yong
zhu feng
..............page:149-150
Main Methods to Prevent Computer from Hacking and Attacking
yang ming hua
..............page:132-133
Optimizing the Performance Based on.NET Smart Client
cao zhong feng ; jiang liang hua ; wang ya wei ; zheng shi yong
..............page:99-101
Design and Implementation of UOA System based on.NET
jiang yu ; zhang bo ; zeng ming ; zhou en hao
..............page:102-104
ipv4 xie yi yu ipv6 xie yi
zhao jing xiong ; wang xiao ju
..............page:109-110
Implementation of Web Communication by ExtJS and Pushlet
lei lei ; chen jun
..............page:118-120
Study on the Firewall and Computer Security
yu li
..............page:127-129
yi zhong zhi bo fu wu qi de she ji yu shi xian
chen zuo ; ai xiong jun
..............page:97-98
gong gong fu wu xin xi men hu zhong fu wu guan li ping tai de yan jiu
lu dan ; song ting xin
..............page:85-87
Application Research of Dynamic Workflow in E-Goverment
yang zuo ; zhang zuo
..............page:82-84
Application Research on computer aided process planning system
tang jian mei ; chen hong hong
..............page:72-74
san wei dong hua zhi zuo maya ji shu yan jiu
wang sheng wei
..............page:157-158
Application Research on Java Inner Class in JDBC
yue jian bin
..............page:61-62
A New Single Sign-On Authentication Protocol
zhao rong ; zhang xue feng ; fan jiu lun
..............page:134-136
Research on LAN Conflict
chen bo chao
..............page:111-112
Survey On Web Service And its Key Technologies
yin zhao bing ; wang jia yang
..............page:121-123
Computer Network and Information Security
lu han wen
..............page:130-131
ji yu pki de wu xian yi gou wang jie ru ren zheng
yuan li ; huang da hai
..............page:115-117
Study on the Computer Network of Information Security
yu hua chuan
..............page:124-126
The Analysis of Arbitrage Model in Stock Market
zhang zhen ; che wen gang
..............page:89-91
WinCC Monitoring Scheme of Controlling System in Pickling Line
hu fan ; hu ming
..............page:75-77
ji yu fen ceng si xiang de jie mian kong jian tuo dong
guo qing hua ; zhu zhan li
..............page:36-37
yi zhong gai jin de knn zhong wen wen ben fen lei suan fa
du lin na ; zuo guang hui ; yang xia xia ; liu li song
..............page:51-53
tan tao sf6 nong du bao jing qi de fen xi yu she ji
li hong xia
..............page:65-67
Research on Vertical Search Engines Based on Ontology
zhang min
..............page:13-15
Data Warehouse Integration Base on Meta Data Model
bao li hong ; han shuang wang ; wang wei
..............page:153-154
fei fu ju zhen fei fu man zhi fen jie de cheng xu shi xian
xu tai yan ; hao yu long
..............page:32-33
sui ji bu er tu xiang de ke li fen xi ji qi matlab shi xian
xie wen juan
..............page:161-162
The Visnal Effec of Web Design for Stimulating Student's Cognitive Psychology
yi shuang ; zeng xia ; huang yun
..............page:187-189
M-learning Model Design Based on M-streaming Media Technology
zhou li zuo
..............page:190-192
Study on MAC Address in Ethernet
qiao sen
..............page:113-114
Design of Continuous Emissions Monitoring System Based on GPRS
xu la mei ; chen ming
..............page:70-72
yi zhong ji yu er wei jing yan mo shi fen jie de ren lian shi bie fang fa
wang zuo ; dang de yu ; sun bin
..............page:159-160
Stndy on S-T Analysis and its Cases Based on information entropy theory
yu biao ; wang xing hui
..............page:40-42
dang qian ji suan ji ke cheng shi jian jiao xue gai ge tan jiu
zhou jin song
..............page:183-184
pdm zhong bom guan li ji shu de yan jiu
yuan qiong
..............page:27-28
jia mi cun chu she bei qu dong cheng xu de you hua she ji
ye jun yao ; liu ke ning
..............page:5-7
Arms Object Determination from Arms Information Articles
gao wen li
..............page:29-31
wapi ren zheng xie yi de yan jiu ji gai jin
liu si min
..............page:23-24
tu xiang qu zao de xiao bo zuo zhi fa yan jiu
chen zuo ; guo jin cui ; huang wen li
..............page:166-167
Calling and Controlling of Fortran Caculation Program in Delphi
sun yu hong ; zhu yu feng
..............page:56-58
Classification and Recommendation Service Based on Similar Learning Style Resource
zeng xia ; yi shuang ; huang yun
..............page:171-173
Research on the Optimization of Oracle Database
chao zi jie
..............page:142-144
ji yu arcs dong ji de wang luo ke cheng jiao xue she ji tan jiu
li xiao xia ; liu li li
..............page:176-178
Study on the OLAP Technology Based on Data Warehouse
liu chun xia
..............page:155-156
matlab yu vb fu zhu hua gong yi biao ji zi dong hua jiao xue de yan jiu
zeng zuo ya ; li xue cong ; tang xiong min
..............page:196-197
flex jie he delphi jie jue udp tong xin wen ti
tan ai quan ; dai jian wei
..............page:34-35
Research on Campus Information System Integration Based on SOA
chen jian ; jing hong
..............page:67-69
The Enlightenment of Multiple Intelligence to Computer design courses
xiong dong chun ; rong qing
..............page:181-182
pc ji zhong chao chang shu lei she ji
yang yi cheng ; cheng ming
..............page:46-48