Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (23): 129-131.DOI: 10.3778/j.issn.1002-8331.2010.23.036
• 网络、通信、安全 • Previous Articles Next Articles
REN Yan1,REN Ping-an1,2,WU Zhen-qiang1,MA Jian-feng2,ZHANG Jing-dong1,LIU Yan-ping1
任 艳1,任平安1,2,吴振强1,马建峰2,张景东1,刘艳萍1