Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (17): 128-132.DOI: 10.3778/j.issn.1002-8331.2010.17.036
• 网络、通信、安全 • Previous Articles Next Articles
CHEN Shao-hui1,2,MAO Ming1,2,ZHANG Yan-shuo2,3,ZHOU Zhang-xiong1,2
陈少晖1,2,毛 明1,2,张艳硕2,3,周章雄1,2