Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (27): 109-113.DOI: 10.3778/j.issn.1002-8331.2010.27.030
• 网络、通信、安全 • Previous Articles Next Articles
XU Yong-kang1,ZHAO You-qiao2,GONG Si-ping2,LU Song-feng2,WEI Xiao-mao3
胥永康1,赵友桥2,龚四平2,路松峰2,魏筱毛3