Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2010 Issue 3
Research on Computer Network Security of China
zhao zhi yan
..............page:124-125
fen bu shi fang huo qiang ji shu de fen xi yu yan jiu
zhao bing ; sun mei
..............page:126-127
ji yu dai ma shen cha de zong he ruan jian zhi liang ping gu fang fa
peng yu hui ; wang shuang xi
..............page:39-40
Using Ajax in ERP Systems
gao feng
..............page:44-46
shi yong c# yu yan shi xian ceng ci fen xi fa suan fa mo xing
gao peng ; li xue jun
..............page:55-56
Research on Monitoring System for Urban Transportation Based on GPS
liu baozhong wang wei
..............page:68-69
fp-growth suan fa zai wang shang zhao pin xi tong zhong de ying yong
qiao zuo ; chen jun
..............page:57-58
aop bian cheng si xiang de yan jiu
he qing he
..............page:25-27
Design of Device Management System Based on J2EE
deng zhong liang ; li bin
..............page:33-34
lams yu moodle de bi jiao yu zheng he
zuo jing zuo
..............page:19-20
A Watermarking Algorithm Based on 3D MAX
li yaqin li huifang
..............page:110-112
ji yu ip dan bo de yuan cheng huan xing yan jiu ji shi xian
zhang li cheng
..............page:108-109
dian li qi ye wang luo an quan xu qiu he fang hu
jiang jun jie
..............page:134-135
ji yu pppoe de xiao yuan wang arp bing du fang fan
wu ting yan ; shen jian yong
..............page:120-121
Analysis and Research between Rails and J2EE Framework
liu xiangdong
..............page:28-29
ruan jian ce shi xing ye fa zhan dui ce yan jiu
li zuo
..............page:35-36
ji yu mpi yu openmp hun he bing xing ji suan ji shu de yan jiu
li su ping ; liu yu ; liu yan yu
..............page:50-52
shi yong yu afdx de jiao huan jie gou yan jiu
tian ze ; wang zuo hui ; liu juan ; wang zhi
..............page:37-38
ji yu tcp/ip shu ju tong xun xi tong she ji
xie jia xing ; wang jian ; liu hong shan ; mai de jian
..............page:10-12
mian xiang fu wu jia gou de xi tong yan jiu
hu ping fang
..............page:21-23
shi pin ya suo h.264/avc zhong guan yu satd ji suan de gai jin
liu qiong ; xiao chuang bai ; ou yang wan li
..............page:173-175
Visualization of Large-Scale Terrain Based on Open Scene Graph
fu guang bao ; yan hong ping
..............page:176-178
E-commerce Web Data Mining Technology Applied Research
fan ning
..............page:145-146
Video Virtual Editing System Design
wang xiong bing ; he wei
..............page:171-173
Research of USB Encryption Dog System based on Bubble Algorithm
zhang zhi yuan
..............page:122-123
Improved Face Recognition Method based on Eigenface and Euclidean Distance
yang guoliang li huan
..............page:168-170
Discussion on the Teaching Reform of "Data Structure"
ma xiaobo
..............page:183-184
li yong json jin xing wang zhan ke hu duan yu fu wu qi shu ju jiao hu
wang kui sheng ; wang xiao bo
..............page:147-149
yi zhong gai jin de er fen cha zhao suan fa
zou guo xia ; he nan
..............page:53-55
The Application of Data Mining in Microsoft SQL Server 2005 Analysis Services
li jun li ; liu zhan feng
..............page:150-151
ji yu matlab de da gui mo dian lu wen tai fen xi
jin bo ; cai wei ju
..............page:47-49
yi zhong ji yu she xiang tou de ren ji jiao hu she ji yu shi xian
gong guo dong ; yu xue li
..............page:181-182
ji yu shu ju fen lei yu sheng ming zhou qi de rman bei fen you hua
yue peng yu ; li su xiao ; zhao shu jun
..............page:154-155
Analysis and Realizing of Access Library of Arbitrary Type
wang yan xing
..............page:160-162
Design and Implementation of Social Security data migration system XML-based
zheng shiyong zhou jianfeng wang xinxing et al
..............page:136-139
Research on Easycovery of Image Display
guan ying
..............page:179-180
wei ji yuan li yu jie kou ji shu shi yan ke jiao xue
li yong liang ; liu ya qin
..............page:193-194
Discussion on the Campus WLAN Security Policy
cheng hai ying
..............page:128-130
ji yu jdbc de shu ju ku lian jie chi de gong zuo yuan li ji shi xian
wu yu zhi ; jin xiao feng
..............page:143-144
SQL Injection Attack and Defend Against SQL Injection
guo li chuan
..............page:131-133
The application research of Temporal Data Mining in predicting the price of farm products
ming daguan xu qi zhou zhibin et al
..............page:140-142
Design and Implementation of Telecom Asset Data Synchronization
zhou rui ; wang xiao zuo ; hu ying
..............page:158-159
ji yu jdbc de shu ju ku fang wen ji shu
huang dan
..............page:163-165
zhong xiao xue jiao shi pei xun zhong ji yu shou ji de yi dong xue xi mo shi yan jiu
zuo peng zhan ; liu feng tian ; wang xin ; yuan li juan
..............page:198-199
mapx er ci kai fa ji zhi yan jiu yi vc huan jing xia shi xian ying yan wei li
wang wei ; ma hai bing ; zhou mo
..............page:7-9
wang luo ke cheng she ji zhong yin xing zhi shi de zhuan hua ce lue yan jiu
sun nan fei ; lin ying ying
..............page:185-187
Discussion on Cloud Computing
yuan zhe mi ou
..............page:3-4
jiao tong di li xin xi xi tong de tan tao
zhou rui ; hu zuo ; hu ying
..............page:104-105
Design Of Multi-users Embedded MP3 Player
luo yungui zhang youchun
..............page:84-86
New Method of Burning BootLoader
gu mingfei
..............page:17-18
zi dong hua ce shi zai guo ji ruan jian ce shi zhong de ying yong
wang hai jiao ; han wen wen
..............page:12-14
Data Transfer between Epidata Software and Stata Software
guo haitao zhang ze xie hongwei
..............page:15-16
xiao yuan zhong arp bing du yuan li he fang fan cuo shi
huang zuo da
..............page:118-119
wang shang kao shi xi tong de an quan ji shu ji shi xian
pan xi ming ; zhao hong zhou
..............page:116-117
The Analysis On The Security Of E-commerce System
he yalin yu peipei huang wei
..............page:113-115
ji yu zigbee xie yi wu xian chuan gan wang luo de ying yong
cao qing nian ; cao lei ; meng kai yuan
..............page:106-107
qbc shu ju jian suo zai dian zi shang wu jiao xue ping tai de ying yong
yang yong ; huang wei ; pan pei
..............page:188-190
Emergency Decisions Rescues for Fire Protection Based on Evolution Strategy
ou jian jun ; liu hong zhi ; li wen zheng
..............page:97-98
Analysis of Enterprise Resource Management System
liu guang tang
..............page:92-93
yi zhong di ya dc-dc sheng ya dian lu de she ji he shi xian
li xue lian ; chen zuo meng
..............page:80-81
Multi-threaded Serial Communication in WinCE Applications in Navigation System
liu qingliang liu jiancheng
..............page:77-79
Analysis and Implement of Management Ancillary Analysis and Warning System
chen xia ling ; zhang fa yong ; chen guo ; jiang kun
..............page:94-96
ji yu clinux cao zuo xi tong de dian zi ci dian she ji he shi xian
tian ze ; liu juan ; wang zuo hui
..............page:99-100
pai ke wen ti de yan jiu yu gai jin
xu rong quan ; qin xiao yu
..............page:66-67
ji yu java ee de duo gong neng nong cun zong he xin xi fu wu ping tai de she ji yu shi xian
xu qi ; zhou zhi bin ; ming da guan ; zhang bin lian
..............page:74-76
lei da ju biao quan quan ping xiao yin xian shi fang zhen
cheng yu rong ; wang wen qing ; yang ze gang ; zhou jian ping
..............page:62-64