Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (34): 92-94.DOI: 10.3778/j.issn.1002-8331.2010.34.029
• 网络、通信、安全 • Previous Articles Next Articles
JIAO Ming-wei1,JIA Zhen-hong1,QIN Xi-zhong1,LI Tao2,ZHAO Jun-kai2
焦明伟1,贾振红1,覃锡忠1,李 涛2,赵君凯2