[1] |
.
[J]. Library Research, 1998, 28(4): 58-60.
|
[2] |
QIU Jun-ping,XU Chang(1.Research Center for Chinese Science Evaluation (RCCSE) , Wuhan 430072, China; 2.Information Management College, Wuhan University, Wuhan 430072, China).
Research on the Library Resource Ontology Semantic Similarity Measuring
[J]. Library Research, 2015, 45(3): 1-7.
|
[3] |
YAN Hui (Library of Jiangsu University of Science and Technology,Zhenjiang 212003,China).
Grid Technology:The Catalyst of the Transformation of Library Work
[J]. Library Research, 2009, 39(4): 102-103.
|
[4] |
JIANG Ji-ping (Library of Guangxi Normal University,Guilin 541004,China).
Analysis and Solutions of ARP Spoofing Attacks in Library LAN
[J]. Library Research, 2009, 39(4): 106-107.
|
[5] |
HUANG Wei-chun,XU Xi,WU Rui (Library of East China Jiaotong University,Nanchang 330013,China).
Discussion on the Application of Load Balance Technology in Library
[J]. Library Research, 2009, 39(3): 106-108.
|
[6] |
.
[J]. Library Research, 2008, 38(4): 109-110.
|
[7] |
FAN Cui-ping(Library of Jiangxi University of Finance & Economics,Nanchang 330032,China).
The Construction and Management of Wireless Information Platform in University Libraries
[J]. Library Research, 2008, 38(2): 99-100.
|
[8] |
GUO Li-fan, SU Zhi-jun (School of Information Management,Wuhan University,Wuhan 430072,China).
Research on Concepts and Frameworks of Semantic Web Services
[J]. Library Research, 2008, 38(1): 108-110.
|
[9] |
.
[J]. Library Research, 2008, 38(1): 111-113.
|
[10] |
Li Qing ,Ding Yongling.
Analysis of the Construction of Network Security in University Library
[J]. Library Research, 2007, 37(3): 97-99.
|
[11] |
Huang Liang,Wang Lu ,LI Jing.
Application of WLAN in University Library Network
[J]. Library Research, 2007, 37(2): 101-103.
|
[12] |
Wang Xihe.
Managed Security Service of Library Network
[J]. Library Research, 2007, 37(3): 99-101.
|
[13] |
Su Zhiiun,Guo Lifan ,Weng Dandan.
Research on the Application of P2P Semantic Web in InfoQuilt
[J]. Library Research, 2007, 37(3): 102-104.
|
[14] |
Mao Xingwu.
Careful Management of Passwords Improves Security of Information System
[J]. Library Research, 2006, 36(3): 96-98.
|
[15] |
Liu Qiumei, Zheng Gengzhong.
Design and Research of Engine Based on WebSphinx
[J]. Library Research, 2006, 36(1): 83-85.
|