相似文献/References:
[1]吉同路 柏永飞 王立松.住宅与房地产电子政务中数据挖掘的应用研究[J].计算机技术与发展,2010,(01):235.
JI Tong-lu,BAI Yong-fei,WANG Li-song.Study and Application of Data Mining in E-government of House and Real Estate Industry[J].,2010,(09):235.
[2]吉同路 潘跃建 王立松.基于RBAC模型实现电子政务系统业务的柔性处理[J].计算机技术与发展,2010,(02):52.
JI Tong-lu,PAN Yue-jian,WANG Li-song.Implementation of Flexibility for Electronic Government System Based on RBAC Model[J].,2010,(09):52.
[3]程思 程家兴[].VPN中的隧道技术研究[J].计算机技术与发展,2010,(02):156.
CHENG Si,CHENG Jia-xing[].A Brief Discussion on Tunnel Technical of VPN[J].,2010,(09):156.
[4]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(09):170.
[5]张俊妍 陈启买.SOAP协议性能与安全的研究进展[J].计算机技术与发展,2009,(06):163.
ZHANG Jun-yan,CHEN Qi-mai.Survey on Performance and Safety of SOAP[J].,2009,(09):163.
[6]支萌萌 王汝传.一种新的P2P安全积分机制[J].计算机技术与发展,2009,(08):137.
ZHI Meng-meng,WANG Ru-chuan.A New Secure Incentive Mechanism in Peer- to- Peer System[J].,2009,(09):137.
[7]董崇杰 傅秀芬 王凤梅 唐志成 顾牡丹.基于J2EE的公安厅审计信息系统的设计与实现[J].计算机技术与发展,2009,(09):246.
DONG Chong-jie,FU Xiu-fen,WANG Feng-mei,et al.Design and Implementation of a Public Security Department Audit Information System Based on J2EE[J].,2009,(09):246.
[8]孙丽艳.基于激励机制的认知无线电自私行为研究[J].计算机技术与发展,2009,(10):170.
SUN Li-yan.Study of Cognitive Radio' Selfish Behavior Based on Two- Stage Incentives Mechanism[J].,2009,(09):170.
[9]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(09):181.
[10]莫永新 孙红兵.基于Multi-agent技术的电子政务系统设计[J].计算机技术与发展,2009,(10):200.
MO Yong-xin,SUN Hong-bing.E- government System Development Based on Multi - agent Technology[J].,2009,(09):200.
[11]赵震,任永昌. 大数据时代基于云计算的电子政务平台研究[J].计算机技术与发展,2015,25(10):145.
ZHAO Zhen,REN Yong-chang. Research on E-government Platform Based on Cloud Computing in Big Data Era[J].,2015,25(09):145.