计算机专业科技论文写作必备技巧_第1页
计算机专业科技论文写作必备技巧_第2页
计算机专业科技论文写作必备技巧_第3页
计算机专业科技论文写作必备技巧_第4页
计算机专业科技论文写作必备技巧_第5页
已阅读5页,还剩41页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1Paper

Writing12Paper

WritingË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work23IntroductionË

Background

Topic

(1-2

paragraphs)Ë

Literature

Review

Motivation

(1

paragraph)Ë

Algorithm

Overview

(1

paragraph)Ë

Contributions

(1

paragraph)Ë

Experiment

OverviewË

Roadmap

(1

paragraph)34Background

TopicBackgroundTime

Oriented4Application

OrientedTopicË

Concept,

Characteristics,

Application,

Importance,and

etc.5BackgroundTopic56IntroductionË

Background

Topic

(1-2

paragraphs)Ë

Literature

Review

Motivation

(1

paragraph)Ë

Algorithm

Overview

(1

paragraph)Ë

Contributions

(1

paragraph)Ë

Experiment

OverviewË

Roadmap

(1

paragraph)67Literature

Review

Motivation7Ë

Notable

Method

Summarization

(Focus

onnearest

neighbors)Ë

Comments

(Weakness)Ë

Motivation

(against

the

weakness)8Literature

ReviewMotivation89IntroductionË

Background

Topic

(1-2

paragraphs)Ë

Literature

Review

Motivation

(1

paragraph)Ë

Algorithm

Overview

(1

paragraph)Ë

Contributions

(1

paragraph)Ë

Experiment

OverviewË

Roadmap

(1

paragraph)910Algorithm

Overview

&

Contribution10Ë

Method

DefinitionË

Principle

DescriptionË

Contribution11Algorithm

Overview

&

Contribution1112Contributions12Ë

New

ConceptË

New

ModelË

New

Algorithm

(More

Efficient,

Less

Memory,Parallelism

and

etc.)Ë

New

Result

(Significant

in

Application

Domain)13IntroductionË

Background

Topic

(1-2

paragraphs)Ë

Literature

Review

Motivation

(1

paragraph)Ë

Algorithm

Overview

(1

paragraph)Ë

Contributions

(1

paragraph)Ë

Experiment

OverviewË

Roadmap

(1

paragraph)1314Experiment

OverviewË

ImplementationË

DataË

Result1415IntroductionË

Background

Topic

(1-2

paragraphs)Ë

Literature

Review

Motivation

(1

paragraph)Ë

Algorithm

Overview

(1

paragraph)Ë

Contributions

(1

paragraph)Ë

Experiment

OverviewË

Roadmap

(1

paragraph)1516Roadmap1617Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work1718Related

Work

(Main

Content)18Ë

Detail

some

notable

worksË

Give

comments

individually

or

by

groupË

Summarize

irrelevant

works

in

a

few

wordsË

In

time

or

advancing

orderË

Try

to

put

the

methods

to

compare

late.1919202021Related

Work

(Supplement)21Ë

Add

the

headThere

are

plenty

of

covert

channel

methods

in

literature.

Here,

wewill

only

review

some

notable

work

due

to

space

limitation.Now

(Here/

In

this

section),

we

will

review

some

notable

methods(previous

work)……22Related

Work

(Supplement)Ë

Add

the

tail22Hence,

we

are

motivated

to……23Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work2324Preliminaries24Ë

Applying

to

paper

with

lots

of

definitionsË

Three

Components:OverviewDefinitionsProblemDefinition252526Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work2627Algorithm

(Method)27Ë

OverviewË

Preliminaries

(Definitions,

Model

Description)Ë

Put

the

whole

idea

in

Phases

or

StepsË

Emphases

which

phase/step/part

makes

thealgorithm

outstandingË

Use

running

examples,

figures,

tables,pseudo-code......Ë

Supplementary

(limitations,

suggestions,

future

work…28Algorithm

(Overview)2829Algorithm

(Main

Content)29Ë

Phase

1Step

1Step

Phase

2In

the

1st

stepIn

the

2nd

stepË

Phase

……30Algorithm

(Try

to

Make

it

Clear)Alice

and

Bob

would

take

the

following

five

steps

to

transmit

the

secret

messagStep

1:

AliceandBob

communicate

normally.

They

both

record

the

messagelengths

sent

by

Alice,and

make

the

record

as

Reference.Step

2:

Aliceand

Bob

select

a

length

l

from

the

Reference

by

the

same

randomalgorithm.Step

3:

In

the

ith

sending,

Alice

sends

to

Bob

a

message

of

length

lnext

=l+SUMiThe

Reference

is

updated

by

appending

lnext.Step

4:

Bob

decodes

the

ith

message

into

Wi

by

subtracting

l

from

lnext.In

our

method,

the

Step

2

and

3

ensure

that

each

sending

message

wouldlearn

from

the

normal

network

traffic

(Reference)

so

that

messages

from

ourchannel

have

similar

length

distribution

as

normal

network

messages.To

better

resist

the

detection,

our

scheme

could

be

further

enhanced

throughthe

way

that

Alice

periodically

sends

to

Bob

redundant

normal

networkmessages

during

the

transmission.3031Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work3132Experimental

Results32Ë

Overview:

environment,

data,

methods

to

compareË

Data

DescriptionË

Data

PreprocessingË

Compare

against

Other

Algorithms

(Methods)Ë

Parameter

Studies33Experimental

Results33Experimenting

ontheClartnet

dataset

[9],

we

compared

our

scheme

withGirling’s[3]

and

Yao’s[8]

models,

and

estimated

the

upper

bound

of

ourmodel’s

bandwidth.4.1

DatasetClarknet

dataset

contains

the

logs

of

1.6

million

HTTP

queries

from

two

weeks.We

take

the

7239queriesfrom

Client

‘’

as

the

messagesfor

our

experiments.

In

each

query,

the

average

size

of

transmitted

message

is489

bytes

(39

bytes

message

+

450

bytes

header).34Experimental

Results3435Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method)Ë

Experimental

ResultsË

Conclusion

&

Future

Work3536Conclusion

&

Future

Work36Ë

Summarize

what

we

did

in

the

paperMethodExperimental

ResultsAdvantage

(Application)Ë

Future

Work37Conclusion

&

Future

Work3738Five

Main

SectionsË

Abstract,

KeywordsË

IntroductionË

Related

Work

(Literature

Review)Ë

PreliminaryË

Algorithm

(Method

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论