Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Software Guide
1672-7800
2011 Issue 7
A New Simplification Method of Logical Function
Guo Aipin;Chen Yong;Rui Maohai
..............page:3-5
Linux Cluster Service
Gao Shuijuan
..............page:15-17
Embedded Software Testing Research Based V model and TEmb
Chen Jianxun;Ou Taotao
..............page:9-11
ye kuo liu cheng guan jia xi tong de kai fa yu ying yong
gong li he bing ruan ren jun kong de shi
..............page:98-100
Design on the Software for Job of Download and Upload
lin pei tong
..............page:93-95
Multi-Expert System and Its Knowledge Organization
li jie li peng wei
..............page:23-25
shu zu zai vb zhong de duo tai yan jiu
cheng kai gu sun xue qun
..............page:21-22
yong isph mo ni bu ke ya suo liu ti
liang chao xiang
..............page:30-31
qi ye pdm xi tong xuan xing yu shi shi fang fa yan jiu
chen guan hua
..............page:40-42
shen suan zi zai qing xie che pai xiao zheng zhong de ying yong
song fang fang zhang ru liang
..............page:115-116
tu shu guan li xi tong de shu ju ku she ji
liu ding zhi
..............page:164-165
ji yu java de wang luo guan li ruan jian she ji
pan wen juan
..............page:43-45
ji yu codeigniter de blog xi tong de she ji yu shi xian
zong xiao zhong
..............page:103-104
Thining Algorithm of Binary Image
lin xin hui
..............page:48-50
xia gong qi ye guan li xin xi hua dms xi tong
su jun feng chen jie
..............page:119-121
Design and Implementation of Web Framework Based on the SSH and Acegi
Liu Wei;Feng Wei;Liu Youjiang
..............page:122-124
Summary on Inference Problem in Multilevel Secure Database
jiang mei yun
..............page:171-173
Optimization Algorithm and Reviewed of Vehicle Routing
yuan jian qing
..............page:60-61
Research on Application of Fuzzy Data Mining and Genetic Algorithm in IDS
zhu hong ping gong qing ge
..............page:64-65
Genetic Simulated Annealing for Mining Association Web Log
Peng Yeping
..............page:57-59
Research on Security Problems in Internet of Things
Zhang Qianghua
..............page:147-148,200
gao zhi xiao yuan wang luo an quan yan jiu
liu wen
..............page:143-144
ju yu wang luo an quan ying dui ce lue
xu qiang
..............page:137-138
Inquiry learning and Its Design Cases Based on Digital Museum
Yang Zhenzhen;Zhang Jianping
..............page:88-90
Residence Community Monitoring System Based on ZigBee
Li Qing;Zhang Ya
..............page:81-82
Web Services-Based Distributed Information Retrieval Mechanism
Zhang Binbo;Song Ronghua
..............page:76-78
ji yu air de jiao xue gong ju
huang yan ting
..............page:185-186
Research on the Four-Component Instructional Design Model(4C/ID)
sun qiong ling ren xiang
..............page:193-194
Design and Implementation of Barrier-Free Access Control System in Dormitory
Zhu Gejun;Zhang Shuo;Zhu Wenlong
..............page:79-80
Research on Network Security Based on Intrusion Prevention System
zheng li sheng chen jin cong
..............page:145-147
Famous Overseas Network Open Courses Application to Teaching
Pan Caixia;Xu Youpin
..............page:187-188
fa hui zhuan ye su zhi cu jin ke cheng zheng he
liu hai peng
..............page:180-181
han shu shi bian cheng yu yan erlang
guan jian huang fei
..............page:56-57
A Discrete Fingerprinting Code Combined with Turbo
Huang Xin;Lv Hongwei
..............page:54-55
Research on Methods of Collision Detection in Vega
he shu you
..............page:35-37
xu ni yi qi ji shu zai shun bian dian ci jie shou ji zhong de ying yong
han li tong min ming deng shi jian zhang jian ying guo xiu lan
..............page:91-92
Improved Approach of Image Segmentation Fusing Quantitative Roughness
Xie Qi;Wang Jiayang
..............page:149-151
Research and Operation of Oracle database startup process
zhou wen qiong wang le qiu
..............page:169-171
arp qi zha gong ji ji fang fan cuo shi tan tao
zheng jie
..............page:141-142
Design and Analysis of Data Graphical Based on QT
jia shi jun qin kai yu chen hua wei li zhi qiang
..............page:156-158
li yong wiki cu jin fan si xing xue xi yan jiu
meng yue ping
..............page:174-175
ji yu agps de gong gong zi xing che wang dian di tu de yi dong ying yong
cao shi qian hao zuo yang xue qin feng zhong shuang tie jun
..............page:159-161
gao xiao ji suan ji shi yan shi guan li gai shu
huang yong fang
..............page:132-133
Design and Realization of Network Study Supervisory System
Shi Donghui;Zhang Hongying
..............page:129-131
Web Services with the Analysis,Test and Validation
wu qiang
..............page:12-14
tu de zui duan lu jing suan fa ji qi zai wang luo zhong de ying yong
liu shu lin yin yu mei
..............page:51-53
bp shen jing wang luo mo xing yu xue xi suan fa
fan zhen yu
..............page:66-68