Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2010 Issue 4
yi zhong ji yu yong hu xing wei jing tai jian mo de zai xian ke fu xi tong
yang lei ; wu ling ; sun jing sheng
..............page:76-77
Deisgn and Implementation of Nv Shu OCR
wan chen
..............page:95-96
Study on Modeling of Music Emotion
guo
..............page:105-106
e-guide zai shou ji ping tai de ying yong she ji
jiang wei na
..............page:70-72
zai xian tao lun zhong zhi shi jian gou yu tao lun hua ti de yan jiu yi xu si xue xi she qu lv wei ge an
yu ming mei ; li wen guang ; zhong da ; wang xin hui
..............page:44-46
Particle Swarm Optimization and Its Philosophical Implications
lan yu long ; huang sheng zhong
..............page:50-52
shu zi tu xiang chu li zong he xing jiao xue shi yan de she ji
wang jian wei ; qu zhong shui
..............page:56-57
The Improvement of Query Duration Based on Kademlia Mode
yang zuo ; ji hua
..............page:113-115
Multi Layer Architecture of GPRS Based Electrical Meter Reading System Research
du li xin ; duan chun sun
..............page:110-112
ji yu wu xian duan cheng wang luo de hart xie yi gai shu
cao qing nian ; cao lei ; meng kai yuan
..............page:132-134
asp.net zhong excel wen dang sheng cheng ji shu yan jiu
wang xing ; li ju ; chen zuo
..............page:130-131
Design and Realization on the Glass Batching Control System Base on VB.NET and OPC
zhang chun jiao ; qian gui fen
..............page:92-94
web2.0 xia jiao yu shi xi guo cheng de ping jia fang fa tan jiu
chen ling ping ; huang ping ping
..............page:102-104
Systems Security Engineering Capability Maturity Model and its Appraisal
mo zuo ; peng guo jian
..............page:156-158
An Efficient Algorithm in Text Categorization Based on Clustering Center Initialization
liu jin ling ; wang chao ; xie shao feng
..............page:47-49
mou 50mw qi lun ji xu ni wei xiu xun lian xi tong she ji yu shi xian
tang xian feng ; pan yang fen ; jiang jian hua
..............page:53-55
Research of Image Slice Technology in J2ME
gao ang ; yu jing ru
..............page:183-184
ji yu shu ju cang ku de gao xiao jiu ye xin xi olap xi tong she ji yu shi xian
ma you zhong ; ma min sheng ; ren gang
..............page:171-172
wang luo xie yi fen xi ji shu yan jiu
liu zuo ; zhang chang quan
..............page:116-118
da qing you tian chang gui ce jing shu ju guan li yan jiu
liu rui chao
..............page:164-166
Petri Net-Based Automated Trust Negotiation Theory
wang zheng jiang
..............page:126-128
ji yu heritrix de nei rong sou suo yin qing xi tong
li dan ; gu bao lei
..............page:129-130
The Integration and Development of the IC-Card Prepaidgas Meter Gas Selling Management
zhang yan ping ; wang xiang ling
..............page:63-64
ji yu tms320dm642 dsp de shi shi shi pin jian kong xi tong shi xian
kuang zuo ; wu liang jian ; liu hai hua
..............page:97-99
ji yu tapestry5 de gao xiao jiao shi dang an guan li xi tong shi xian
zhang yong jun ; liu xue song
..............page:61-62
WSN Data Management System
gu peng ; luo yuan ting ; zhang jie
..............page:176-178
ji yu ji he mo xing de yu yan tu xiang xiao zheng
cheng guang tao ; chen xue ; sun yue fang
..............page:192-193
Research on Image Retrieval Methods Based on Colors
li jin ; chen nian ; ma shuai jun ; ming hui
..............page:184-186
The Development of WDM Drivers for PCI9056
zhang juan ; liu qiang
..............page:29-30
Research on Open Source Software Used in Educational Informatization
geng qing jun ; wang peng ; sun hua zuo
..............page:26-28
Optimization of Electronic Chart Based on S52
chen wei zuo ; guo ning ; xiong ping min ; kong ling hui ; li guang tao
..............page:181-182
wf gen zong fu wu de yan jiu ji ying yong
chen min ; li jin ; su wei
..............page:23-26
ji yu sca de fu wu mo xing yan jiu
guo wei jun ; liu hong xing
..............page:39-41
Problems and Countermeasures in Network Course Construction
ren hua ; xia ling jun
..............page:198-199
shi yong jmeter cha jian ti gao xing neng ce shi xiao lv
wu zhi gang
..............page:33-35
Research on Personalized Retrieval Model Based on Semantic Directory
yang bo ; wang qi dong
..............page:41-43
ji yu wdm de pcie qu dong she ji he shi xian
tian ze ; liu juan ; wang zuo hui
..............page:9-10
Study of Identity Authentication Based on Zero-Knowledge Proof and M-H Knapsack Algorithm
ma min sheng ; ren gang ; ma you zhong
..............page:18-20
Development XML Forms Based on Model Driven Technology
liu xiang dong
..............page:7-8
yi zhong ke kuo zhan de mmorpg wang you fen bu shi fu wu qi jia gou fang an
liu juan juan ; tao jia xiang
..............page:121-123
sms4 fen zu mi ma ti zhi de fen xi ji qi shi xian
xie fang qing ; liu jia
..............page:146-149
Intrusion Detection Based on Bayes
tang shu zhen
..............page:149-151
afdx wang luo xie yi zhan fen xi he she ji
tian ze ; wang zuo hui ; hou rui
..............page:138-140
wang luo huan jing xia duo mei ti xin xi jian suo tan jiu
lian hui ping ; xie juan ; fu zuo
..............page:134-137
ji yu gridshib de qun zu an quan tong xin yan jiu
zhang nian qun
..............page:152-153
gao xiao guan li xin xi xi tong an quan she ji ji shi shi
ji xiu hui
..............page:154-155
The Research and Application of the Removal of Classified Data under NTFS
bai yang ; chen qi xiang
..............page:159-161
bu tong cha zhi fang fa shi xian shu zi tu xiang xuan zhuan yan jiu
yuan feng gang ; liu jian cheng
..............page:187-189
Implemention of the Restrict of XML Data Integrity
zhou jin song
..............page:31-33
ji yu shen jing wang luo de tu xiang yan se ce wen yan jiu
su yi zuo ; zhang zuo ; he guo xing
..............page:189-191