Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2005 Issue 1
A Novel Saturation Control Design and Analysis in TTL Circuits
liu hui min ; wu dan ; jiang mei
..............page:121-124
Criterion and Realization of Wireless LAN (WLAN)
li xia
..............page:125-128
Design and Implementation of Teaching Management System
huang wan hua ; lu sheng lian ; wang zhi xing
..............page:114-116,124
Applicafion on Business Platform Based On Short Message
xiong wen ; ye jun min
..............page:110-113
Implementation of A Portable Network Test Instrument
hua jun ; qiu hua ; xie zi mei
..............page:102-105
System of the Distance Experiment Based on Embedded Web Server
chen tao tao ; tian yu peng
..............page:98-101
Application of SIMATIC S7-400 in High-Speed Cigaratte Maker
wang jing ; zhou dong qiao
..............page:95-97,105
Research about the Combination of CORBA and JAVA
liu chun ; xiong qian xing ; wang jing
..............page:30-33
Boundary-Scan Test Standard--from 1149.1 to 1149.6
chen xin wu ; yu ben hai
..............page:25-29
A Dynamic Identity Authentication System Based on Mobile Telephone Token-ring
zeng wei guo ; hu han ping ; wang zu xi ; kong tao
..............page:21-24,40
Standardization of Biological Metabolic Petri Nets Model based on XML
xu tao ; liao sha ; zeng shao qun ; liu bi feng
..............page:17-20
Spike Tools: Software Applying to Neuronal Network Spike Sorting
sun ni ; zhou zuo ; li xiang ning ; zeng shao qun
..............page:13-16,29
Implementation of Arithmetic Coding Algorithm Based on Binary Index Tree in SPIHT
wang guo you ; weng chuan qiang
..............page:1-4
Distributed CA of ID Based Encrypt in Ad hoc
wang hai bo ; hu han ping ; wu jun
..............page:5-8,20
Development of A Modeling Language for Systems Biology
chen zuo ; lu qiang ; zeng shao qun ; liu bi feng
..............page:9-12
Security Design Of Webpages Program
yang zuo ; dong shao jun
..............page:88-91,94
Something about Accouting Information System
sun yan
..............page:85-87
Research of SAML-Based Web Service Security Model
zheng fang ; cheng ying ; wang lin ping
..............page:81-84
Analysis of Traffic Engineering Based on MPLS
zhang dong ; zhang xing ming ; li zuo
..............page:77-80
Circuit Fault Diagnosis based on IC Thermal Mode
chen bin ; yu sheng lin
..............page:73-76
Research of Vehicle Type Recognition Technology
liu shi fang ; liu ye bing
..............page:71-72,76
Simple Analysis of Internal Network
liu wei ; yu bin
..............page:68-70
Summary of Telecommunications Management Network
liu jian
..............page:63-67
Position To Automatically Regulate Control In VB Program
hu qi guang ; li zheng hua
..............page:60-62
Analysis of FAT32 File System
zhang ming liang ; zhang zong jie
..............page:56-59
Mining Anomalous Patterns in Ttime-Series Data Sets Based on Linear Shape
lu sheng lian ; huang wan hua ; lin shi min
..............page:53-55,62
Several Policies for Achieving the Security of Operating System
zhu ya shu ; zhu jing zhou
..............page:49-52