Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2011 Issue 4
qi ye shi gong xiang mu an quan guan li xi tong she ji
liu zhen jie liu yu cun
..............page:86-88
The Deploying and Implementation of VPN in the Campus Network
liu yu ping
..............page:117-118
ji yu mo hu shang kong jian de mo hu ju lei yan jiu
deng xian lun wang jia yang
..............page:10-12
IA GA-based Optimization Algorithm for QoS Routing
Li Ying
..............page:39-41
ji yu ansys de liu leng zhui bi lei zhen jie gou she ji
wu si wu bin fang
..............page:51-52
gis ji shu zai dang an guan li zhong de ying yong
li hui ling
..............page:13-14
shu ju xin xi zhi neng hua cha xun zhi chi xi tong de she ji
chen yu ke gao feng
..............page:94-96
Digital Campus Data Center and Database Security
lin chun ni
..............page:163-165
Dynamic Charts Creation by Skillful Use of Excel Function
Liu Xiaorong
..............page:8-9
opengl zhong de guang zhao ji shu yan jiu
yang jian zhang min
..............page:84-86
yi zhong ji yu wang luo zhuang kuang de duo xian cheng xia zai diao du suan fa
wang kui sheng lu meng qiao wang xiao bo
..............page:36-38
ipv6 wang luo zhong yin bi tong dao de ying yong
zhao fu min
..............page:132-133
Research on Blended Learning Theory System and Technical Basic
Tan Huanhuan;Zhang Yong
..............page:3-5
Talking About the Architecture of Oracle Superficially
Wang Huihui
..............page:31-35
shu ju guan dao ji shu zai xi tong shu ju bei fen yu hui fu zhong de ying yong
shi qing chen feng fu hong wei
..............page:157-159
ji yu gis zu jian ji shu de ruan jian kai fa
yang yong guo
..............page:172-174
ruan jian ce shi guo cheng kong zhi xi tong de yan jiu he she ji
li ling ling xu juan juan
..............page:19-21
ge xing hua sou suo yin qing ji shu yan jiu
gu li ping
..............page:106-108
Three V-based neural network system
qiu zhao xin zou zi ming
..............page:112-114
ji yu c~# de xiao xing chao shi guan li xi tong
chu pei bin yang xiu feng
..............page:96-98
Discussion on the Trends of Enterprise Network Management Technology
xu peng wei zuo li jian
..............page:130-131
jiao yu you xi dui xue sheng duo yuan zhi neng fa zhan de ying xiang yan jiu
zhang zuo lei ti nan li jing
..............page:197-199
Design and Implementation of Callcenter Scheduling System Based on SSH
Zhou Wenqiong;Wang Leqiu;Tang Junwu;et al.
..............page:53-55
Analysis on Network Security Based on Campus Network
Chen Yanhua;Zhang Kai
..............page:142-144
yi zhong gai jin de zhong wen shi ti guan xi chou qu fang fa
liu jian zhou shao xiong kai
..............page:27-29
The Design of Intelligent Fishbowl
Zhang Jing;Xiao Jie;Xiong Youda
..............page:58-59
kai yuan lu you qi shang de wang luo liu liang kong zhi
zhuo xian de
..............page:104-105
shu zi tu xiang ju bu fen ge suan fa de yan jiu
yang ben sheng
..............page:45-47
Research on WinCE-based Embedded Databases
zhou dong sheng wu shan shan
..............page:154-156
tong yong xing ke jian zhi zuo xi tong de she ji yu shi xian
peng xu shan
..............page:102-103
ji yu hog de ren ti jian ce fang fa de gai jin
zhou jin zhi wang juan
..............page:76-78
The Design and Implementation of Computerized Adaptive Test System Based on Ajax
wang wei xing zhang liang ping
..............page:60-62
ji yu .net de shu ju ku fang wen ji shu you hua yan jiu
liu xiao yu
..............page:150-151
Study of Hibernate’s Caching Mechanism
cheng guang lei
..............page:30-31
Research on Bilingual Teaching Mechanism of Basic Computer Course
zhu ying fang xie jian quan
..............page:190-192
A Document Transparent Decrypted Logo Embedding Method Research
xia liang zhu guo chun
..............page:138-139
ji yu leach xie yi de fen cu suan fa she ji
dai hua wang jian ping
..............page:42-44
ji suan ji cheng xu she ji ke cheng shuang yu jiao xue yan jiu
chen qing shao yu xiang
..............page:181-182
yong wei bo zeng qiang jiao yu li liang
li dan dan cheng guo zhong
..............page:183-184
ji yu xin xi rong he de duo mei ti nei rong sou suo
li ying ou yang wei xin wang zi
..............page:119-120
min jie ce shi guo cheng
xu fei
..............page:23-24
Requirement Management Based on Workflow
hu sheng yu liu zuo hui
..............page:15-17
Versioning and Locking:A Technical Comparison in Transaction Management
fan lei hu hong suan
..............page:147-149
ji yu struts he hibernate de lv you zi xun xi tong de she ji he shi xian
bao de hai liu wei zhang liang
..............page:65-66
li yong zhong gou gai shan she ji
sun xiu ying song chao
..............page:21-22
ying yong xing ben ke ji suan ji zhuan ye li san shu xue jiao xue shi jian
liu yi jun zhu guang ping zhu ming fang jiang hong fen gu chun sheng
..............page:177-178
The Design and Implementation of General Inquires the Module
Qi Xinan;Lv Daigang
..............page:99-101