Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2004 Issue 5
Research on Network Storage
dai zuo
..............page:110-112
Application of Waveform Inspection Technology in Fault Diagnosis
zhong wei ; wei zuo long
..............page:108-109,52
The Architecture of Intrusion Detection System
meng xian jun ; wu xun ; qin xu shan ; wei zuo long
..............page:105-107,85
Development of Management Information System of Teaching Book Based on B/S Mode
yang wen jie ; liu hao xue ; wang ke meng
..............page:102-104
Method of Neural Networks Study Based on Genetic Algorithms
guo jia ; wang rui min ; wang jia hai ; zhang zhong min
..............page:98-101
Distance-based Outliers Detection and Applications
lu sheng lian ; lin shi min
..............page:94-97
A Survey of the Backup and Recovery Engine of COM Component
huang zhi ye
..............page:89-93
Virtual Database Middleware based on XML
yi ; liang zhi yong ; tang ping
..............page:86-88
Development and Design of Environmental Management Information System based on GIS Technology
tian yu ; lu xiu shan ; jiang zuo ; qiao ping lin
..............page:83-85
Application of An Improved Genetic Algorithm in Composing A Test Paper
yang lu ming ; chen da zuo
..............page:76-79
Mobile IP and Problems Facing It and Solutions
wang nian qiao ; chen he bei
..............page:64-68
Statistic Analysis of Mechanism Assembly
peng zhan yong
..............page:61-63
SSL Protocol and Its Application
zhong xi yu
..............page:53-56,68
How Use JAAS To Realize Security in J2EE
lv yan qin ; lv zong jian
..............page:47-52
VLSI Design of Content Scrambling System for DVD-ROM Application
yuan li xia ; xia jun ; zou xue cheng
..............page:43-46,52
Application of GPRS in ITS
tian zhong he ; chen hu
..............page:39-42
Making Method and Application of the Vector Electronic Maps in ITS
shi lei ; lu yi min ; yu zuo
..............page:36-38
A Method of Inspecting Worm-viruses in Shared Directories
lu de bo
..............page:34-35,42
Radar Video Acquisition and Processing System Based on TMS320C6203B
tang jing wei ; yang yun ji
..............page:29-31
An Implementing Technique of Software Component Classification and Retrieval
li xiao ming ; cao wan hua
..............page:25-28,31
A Human-Machine Interface Auto-Generating Technique
zhang dun hua
..............page:20-24
Architecture and Application of EPIC High-performance Microprocessors
tong xiao nian ; yang xi min
..............page:17-19
Use Visual Foxpro to Make Bitmap File of Barcode39 Code
wang ji cheng
..............page:12-16
Designing 32 bit CLA with Schematic Composer
hong gong cun ; chen chao yang ; shen xu bang ; chen min
..............page:8-11
An Analytic Model of Boltzmann Equation in Extremely Scaled MOSFETs
tong jian nong ; zou xue cheng ; shen xu bang
..............page:4-7
Analysis of Image Format and Realization of Image Display
zhao jun ; wang cheng
..............page:1-3,16