·软件开发与设计·
关于电脑集群系统的混合编程的研究··························································· 雷瑞林
Java安全包的MD5防穷举变换算法的研究与实现······································· 傅旭光
E-learning的研究与实现··············································································· 辜雄霖
P2P多点共享传输软件的设计与实现··························································· 赵专政
GridView控件列的动态显示或隐藏的设计···················································· 屈泽明
XML Web Services电子政务异构平台的设计····································· 陈锐,管建和
基于BCB通过Word自动生成表格······························································· 严伍琼
PDU中7-bit字符串编解码的程序设计································· 郭莉慧,马小铁,李凯
运用VB编程实现计算机自动改名······························································· 张俊卿
·数据库与信息管理·
基于数据仓库的烟草决策支持系统研究······························· 岳芳,王艳玲,常志勇
分布式PowerBuilder设计················································································ 游茂
利用Access进行Excel多表数据匹配··························································· 杨文波
计算机管理系统在工商所信息化经济户口管理中的作用······························· 夏爱华
IBM AIX操作系统中逻辑卷管理LVM技术应用··········································· 何洪舟
用Dephi开发奖金发放系统············································· 陈旭东,代令军,刘心媛
·网络与通信·
基于B/S模式的网上医疗保险系统的设计和实现·········································· 杨黎霞
交友WAP网站中约会功能的开发与实现······················································ 刘玉江
利用LotusNotes创新设计Web页面····························································· 卢泽纲
用VS 2005设计网页版Excel··········································· 张更路,张家琦,陈月强
基于Django和Python的Web开发······························································· 王冉阳
基于Delphi和TCP/IP协议的通信编程························································· 陈忠菊
·人工智能及识别技术·
基于AutoCAD的三维斜齿轮的二次开发········ 胡国栋,常春梅,唐海,张杰,尹俊
基于多小波变换的图像整合算法············· 朱琳琳,王刚,刘姝延,孙福文,吕万辉
事件驱动的C51单片机编程模型································································· 庞胜利
利用VB文本框特性制作制作多媒体抢答器························· 李强,陈家宗,宋修宪
DOS下JPG的快速显示和保存方法································································ 江洪
·计算机安全技术·
计算机病毒及防范······················································································· 孟凡杰
浅议僵尸网络攻击······················································································· 邹本娜
移动Ipv6的安全性研究································································· 张永平,王庆现
Ipv6环境下的网络威胁与安全机制的研究··················································· 王小冬
Struts异常处理机制研究及应用····················································· 陈书理,张书贵
IP欺骗攻击的原理、实现与防范································································· 李佳音
Linux防火墙技术及配置实例························································· 何长林,唐永中
对Cisco IOS类型7口令加密的改进·············································· 赵晓峰,李育泽
·计算机应用教学研究·
基于遗传算法的自动组卷系统研究与实现···················································· 夏爱月
主流编程语言的特点与比较········································································· 王良莹
学校厕所智能化节水系统············································································ 刘正标
用VB中的RichTextBox控件的多重撤销······························ 范秀山,王艳语,张晨
TD400快速入门············································································ 张文局,陈周林
|