Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (34): 85-88.DOI: 10.3778/j.issn.1002-8331.2009.34.026
• 网络、通信、安全 • Previous Articles Next Articles
YUCHI Xue-biao1,2,LI Xiao-dong1,YAN Bao-ping1,JI Cheng1,3
尉迟学彪1,2,李晓东1,阎保平1,季 成1,3