Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2011 Issue 1
Design and Implementation of E-Commerce System Based on Struts+JPA+Spring
Zhou Qian Chen Yu Cao Qinghua et al
..............page:88-91
mi feng qun bing xing wang ye zhua qu xi tong
guo bang cai
..............page:68-70
ji yu shu xing ji zhi de web services fang wen kong zhi mo xing
li xiao lin zhang wen zuo yang zuo ze
..............page:136-137
Decision Coverage VS Condition coverage
Wang Jing
..............page:71-72
windo ws xp ri zhi wen jian ge shi fen xi
liu xiu bo wang lian hai
..............page:36-38
yi zhong ji yu bu wan zheng shu ju ji de wang ye fen lei ji shu
cai chong chao
..............page:143-145
ji yu web fu wu de gong zuo liu xie zuo ji shu yan jiu
wen lin bin
..............page:49-51
UPS Power Comparison of Performance and Availability
Niu Tao
..............page:65-67
zu tai ruan jian zhong jian ceng she ji
tang chong hua
..............page:41-43
shi pin shui yin zai duo mei ti ke jian zhong de ying yong
zhu zuo li xue yan
..............page:182-183
ji yu xiao yuan wang de yun xing wei hu ti xi yan jiu
chen hong jun wang xin ke
..............page:149-150
ji yu yi qun you hua de xie zuo xue xi mo shi yan jiu
wei yong wang ru liang
..............page:124-126
ju yu wang nei arp gong ji ji fang fan shi xian
du wei jun
..............page:164-166
odbc yan jiu
tan lei
..............page:39-40
qi ye ji chu shu ju jiao huan ying yong xi tong de she ji yan jiu
xiao ying shuang chen yang
..............page:24-25
ji yu wang luo ping tai de ji suan ji ji chu jiao xue gai ge yu shi jian
zhong zuo he wen xiao yu wen chun
..............page:198-199
Research of Network Security Model Based on the Army’s Data-Camping
Su Jibin Zhang Yongli Han Keyu et al
..............page:156-158
ji yu flex he j2ee jia gou de shu ju fa bu xi tong de she ji yu shi xian
shen ji hui zhang hong jun chen gang wu zong qing
..............page:146-148
pdh sdh zai dian xin wang luo gai zao zhong de qiao yong
jiang xiao jun
..............page:105-106
yi zhong wei fen jin hua suan fa de tu xiang zeng qiang fang fa
zhu zuo fu long hao
..............page:85-88
word yu zai jiao xue zhong de ying yong
zhu bin hua
..............page:189-190
MVB Bus Simulation Study Based on OPNET
Huang Dong Wei Zhiqiang
..............page:52-54
xiao yuan wang an quan ce lue de yan jiu
xiong zhen zhu zhang wen zuo
..............page:159-161
nong cun xin xi hua tui jin shi jian zhong de dui ce yan jiu
zhang peng fei yuan qiu hong
..............page:11-12
dian zi zheng wu wang zhan xin xi de nei rong guan li tan jiu
liu yan bin wei hong yu
..............page:5-7
Analysis of Computer Network Risk Prevention Measures
Jia Shizhen
..............page:153-155
er wei ping mian ba biao de shu ma xiang ji biao ding
wang yu liu huan hai
..............page:177-179
shu ju ku zai you tian di mian xi tong zhong de ying yong
sun zuo xue hua
..............page:126-128
The Application of AI in the Game Made of Stone
Liu Zhenyu Xu Hongjun
..............page:114-116
ji yu flash de fa cai fa fu zhong guo nian mv she ji
ren hai yan
..............page:174-176
Research on Electro Magnetic Compatibility Desihn of Embedded System
Zhou Chao Lv Jian Deng Hao
..............page:21-23
spss ruan jian zai ke ji xiang mu ping gu jie guo tong ji fen xi zhong de ying yong
zhang ming shan qin zhe zhu chang ming
..............page:13-17
Research on Web Application Security Method Research
Zhang Ting
..............page:167-169
cao zuo xi tong jie gou yu gong neng fen xi
yu li
..............page:29-31
ji yu ip de bei dong ce liang xie yi netflow
tang ying li tai hao
..............page:134-135
ruan jian zi dong hua ce shi gong ju yan jiu
deng qing hua
..............page:57-59
ru he wei chi sql server 2005 gao ke yong xing
li zuo zhou
..............page:73-74
ji yu cmmi de zhong xiao xing ruan jian qi ye guo cheng gai jin wen ti yan jiu
zhang nian su wen kun zhang pei jiang yong sheng
..............page:107-108
The Application of Finite Automation Principle in the Implementation of MODBUS Protocol
Su Zhubin Jiang Cunbo Zhang Bin et al
..............page:44-46
yi zhong ji yu chebyshev de gong yue jia mi fang an
cai qiong peng tao
..............page:162-164
yi xue tu xiang de ji suan ji chu li bian yuan jian ce
fu hong wei chen feng cheng song wu di
..............page:172-174
wo guo e-learning de ying yong xian zhuang ji dui ce
he xue ling cheng guo zhong
..............page:138-139
zhong wen duan yu wen ben xiang si du ji suan xin fang fa
wang ying ying ren xian long peng fei
..............page:79-81
zhong wen fen ci ji shu ji qi shi xian
fu nian jun peng chang shui wang wei
..............page:18-20
ftp fu wu qi yong hu fen ji guan li ying yong yan jiu
zhang jun jie
..............page:74-76
Learning Based on Web2.0
ma jin feng
..............page:194-195
li yong api han shu zhi zuo yin le bo fang qi
zhao xu la mei
..............page:119-120
ji yu ji qi xue xi de web wen ben zi dong fen lei
yuan xiao zuo
..............page:26-28
bian xie shi ji suan ji de emc she ji
dong chun lei song chun lei chen wei
..............page:109-111
Change control based on the software project
Gong Jun Li Hong
..............page:31-33
jiao hu shi dian zi bai ban jiao xue zhong jiao shi de jiao se zhuan bian
xu zhi xin huang wei min
..............page:184-185