计算机专业科技论文写作必备技巧课件_第1页
计算机专业科技论文写作必备技巧课件_第2页
计算机专业科技论文写作必备技巧课件_第3页
计算机专业科技论文写作必备技巧课件_第4页
计算机专业科技论文写作必备技巧课件_第5页
已阅读5页,还剩41页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、1Paper Writing2Paper Writing Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work3Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contri

2、butions (1 paragraph) Experiment Overview Roadmap (1 paragraph)4BackgroundTopicBackgroundTopicTime OrientedApplication Oriented Concept, Characteristics, Application, Importance, and etc.5BackgroundTopic6Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algori

3、thm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)7Literature ReviewMotivation Notable Method Summarization (Focus on nearest neighbors) Comments (Weakness) Motivation (against the weakness)8Literature ReviewMotivation9Introduction Background Topic (1-2

4、paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)10Algorithm Overview & Contribution Method Definition Principle Description Contribution11Algorithm Overview & Contribution12Contributions New

5、Concept New Model New Algorithm (More Efficient, Less Memory, Parallelism and etc.) New Result (Significant in Application Domain)13Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overvi

6、ew Roadmap (1 paragraph)14Experiment Overview Implementation Data Result15Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)16Roadmap17Five Main Sections Abst

7、ract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work18Related Work (Main Content) Detail some notable works Give comments individually or by group Summarize irrelevant works in a few words In time or advancing order

8、 Try to put the methods to compare late.192021Related Work (Supplement) Add the head There are plenty of covert channel methods in literature. Here, we will only review some notable work due to space limitation. Now (Here/ In this section), we will review some notable methods (previous work)22Relate

9、d Work (Supplement) Add the tail Hence, we are motivated to23Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work24Preliminaries Applying to paper with lots of definitions Three Components: Ov

10、erview Definitions Problem Definition 2526Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work27Algorithm (Method) Overview Preliminaries (Definitions, Model Description) Put the whole idea in

11、 Phases or Steps Emphases which phase/step/part makes the algorithm outstanding Use running examples, figures, tables, pseudo-code. Supplementary (limitations, suggestions, future work)28Algorithm (Overview)29Algorithm (Main Content) Phase 1 Step 1 Step 2 Phase 2 In the 1st step In the 2nd step Phas

12、e 3 30Algorithm (Try to Make it Clear)Alice and Bob would take the following five steps to transmit the secret message:Step 1: Alice and Bob communicate normally. They both record the message lengths sent by Alice, and make the record as Reference.Step 2: Alice and Bob select a length l from the Ref

13、erence by the same random algorithm. Step 3: In the ith sending, Alice sends to Bob a message of length lnext =l+SUMi. The Reference is updated by appending lnext. Step 4: Bob decodes the ith message into Wi by subtracting l from lnext.In our method, the Step 2 and 3 ensure that each sending message

14、 would learn from the normal network traffic (Reference) so that messages from our channel have similar length distribution as normal network messages. To better resist the detection, our scheme could be further enhanced through the way that Alice periodically sends to Bob redundant normal network m

15、essages during the transmission.31Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work32Experimental Results Overview: environment, data, methods to compare Data Description Data Preprocessing

16、 Compare against Other Algorithms (Methods) Parameter Studies33Experimental ResultsExperimenting on the Clartnet dataset 9, we compared our scheme with Girlings3 and Yaos8 models, and estimated the upper bound of our models bandwidth.4.1 DatasetClarknet dataset contains the logs of 1.6 million HTTP

17、queries from two weeks. We take the 7239 queries from Client as the messages for our experiments. In each query, the average size of transmitted message is 489 bytes (39 bytes message + 450 bytes header).34Experimental Results35Five Main Sections Abstract, Keywords Introduction Related Work (Literat

18、ure Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work36Conclusion & Future Work Summarize what we did in the paper Method Experimental Results Advantage (Application) Future Work37Conclusion & Future Work38Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorit

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论