Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (36): 101-104.DOI: 10.3778/j.issn.1002-8331.2010.36.028
• 网络、通信、安全 • Previous Articles Next Articles
Nurmamat Helil1,Kaysar Rahman1,2,Azhar Halik1,2
努尔买买提·黑力力1,开依沙尔·热合曼1,2,艾孜海尔·哈力克1,2