版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1Paper
Writing12Paper
WritingË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work23IntroductionË
Background
Topic
(1-2
paragraphs)Ë
Literature
Review
Motivation
(1
paragraph)Ë
Algorithm
Overview
(1
paragraph)Ë
Contributions
(1
paragraph)Ë
Experiment
OverviewË
Roadmap
(1
paragraph)34Background
TopicBackgroundTime
Oriented4Application
OrientedTopicË
Concept,
Characteristics,
Application,
Importance,and
etc.5BackgroundTopic56IntroductionË
Background
Topic
(1-2
paragraphs)Ë
Literature
Review
Motivation
(1
paragraph)Ë
Algorithm
Overview
(1
paragraph)Ë
Contributions
(1
paragraph)Ë
Experiment
OverviewË
Roadmap
(1
paragraph)67Literature
Review
Motivation7Ë
Notable
Method
Summarization
(Focus
onnearest
neighbors)Ë
Comments
(Weakness)Ë
Motivation
(against
the
weakness)8Literature
ReviewMotivation89IntroductionË
Background
Topic
(1-2
paragraphs)Ë
Literature
Review
Motivation
(1
paragraph)Ë
Algorithm
Overview
(1
paragraph)Ë
Contributions
(1
paragraph)Ë
Experiment
OverviewË
Roadmap
(1
paragraph)910Algorithm
Overview
&
Contribution10Ë
Method
DefinitionË
Principle
DescriptionË
Contribution11Algorithm
Overview
&
Contribution1112Contributions12Ë
New
ConceptË
New
ModelË
New
Algorithm
(More
Efficient,
Less
Memory,Parallelism
and
etc.)Ë
New
Result
(Significant
in
Application
Domain)13IntroductionË
Background
Topic
(1-2
paragraphs)Ë
Literature
Review
Motivation
(1
paragraph)Ë
Algorithm
Overview
(1
paragraph)Ë
Contributions
(1
paragraph)Ë
Experiment
OverviewË
Roadmap
(1
paragraph)1314Experiment
OverviewË
ImplementationË
DataË
Result1415IntroductionË
Background
Topic
(1-2
paragraphs)Ë
Literature
Review
Motivation
(1
paragraph)Ë
Algorithm
Overview
(1
paragraph)Ë
Contributions
(1
paragraph)Ë
Experiment
OverviewË
Roadmap
(1
paragraph)1516Roadmap1617Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work1718Related
Work
(Main
Content)18Ë
Detail
some
notable
worksË
Give
comments
individually
or
by
groupË
Summarize
irrelevant
works
in
a
few
wordsË
In
time
or
advancing
orderË
Try
to
put
the
methods
to
compare
late.1919202021Related
Work
(Supplement)21Ë
Add
the
headThere
are
plenty
of
covert
channel
methods
in
literature.
Here,
wewill
only
review
some
notable
work
due
to
space
limitation.Now
(Here/
In
this
section),
we
will
review
some
notable
methods(previous
work)……22Related
Work
(Supplement)Ë
Add
the
tail22Hence,
we
are
motivated
to……23Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work2324Preliminaries24Ë
Applying
to
paper
with
lots
of
definitionsË
Three
Components:OverviewDefinitionsProblemDefinition252526Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work2627Algorithm
(Method)27Ë
OverviewË
Preliminaries
(Definitions,
Model
Description)Ë
Put
the
whole
idea
in
Phases
or
StepsË
Emphases
which
phase/step/part
makes
thealgorithm
outstandingË
Use
running
examples,
figures,
tables,pseudo-code......Ë
Supplementary
(limitations,
suggestions,
future
work…28Algorithm
(Overview)2829Algorithm
(Main
Content)29Ë
Phase
1Step
1Step
2Ë
Phase
2In
the
1st
stepIn
the
2nd
stepË
Phase
3Ë
……30Algorithm
(Try
to
Make
it
Clear)Alice
and
Bob
would
take
the
following
five
steps
to
transmit
the
secret
messagStep
1:
AliceandBob
communicate
normally.
They
both
record
the
messagelengths
sent
by
Alice,and
make
the
record
as
Reference.Step
2:
Aliceand
Bob
select
a
length
l
from
the
Reference
by
the
same
randomalgorithm.Step
3:
In
the
ith
sending,
Alice
sends
to
Bob
a
message
of
length
lnext
=l+SUMiThe
Reference
is
updated
by
appending
lnext.Step
4:
Bob
decodes
the
ith
message
into
Wi
by
subtracting
l
from
lnext.In
our
method,
the
Step
2
and
3
ensure
that
each
sending
message
wouldlearn
from
the
normal
network
traffic
(Reference)
so
that
messages
from
ourchannel
have
similar
length
distribution
as
normal
network
messages.To
better
resist
the
detection,
our
scheme
could
be
further
enhanced
throughthe
way
that
Alice
periodically
sends
to
Bob
redundant
normal
networkmessages
during
the
transmission.3031Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work3132Experimental
Results32Ë
Overview:
environment,
data,
methods
to
compareË
Data
DescriptionË
Data
PreprocessingË
Compare
against
Other
Algorithms
(Methods)Ë
Parameter
Studies33Experimental
Results33Experimenting
ontheClartnet
dataset
[9],
we
compared
our
scheme
withGirling’s[3]
and
Yao’s[8]
models,
and
estimated
the
upper
bound
of
ourmodel’s
bandwidth.4.1
DatasetClarknet
dataset
contains
the
logs
of
1.6
million
HTTP
queries
from
two
weeks.We
take
the
7239queriesfrom
Client
‘’
as
the
messagesfor
our
experiments.
In
each
query,
the
average
size
of
transmitted
message
is489
bytes
(39
bytes
message
+
450
bytes
header).34Experimental
Results3435Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method)Ë
Experimental
ResultsË
Conclusion
&
Future
Work3536Conclusion
&
Future
Work36Ë
Summarize
what
we
did
in
the
paperMethodExperimental
ResultsAdvantage
(Application)Ë
Future
Work37Conclusion
&
Future
Work3738Five
Main
SectionsË
Abstract,
KeywordsË
IntroductionË
Related
Work
(Literature
Review)Ë
PreliminaryË
Algorithm
(Method
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024-2030年中国地理书籍行业市场运营模式及未来发展动向预测报告
- 2024-2030年中国园林古建筑行业发展前景规划研究报告
- 2024-2030年中国周界报警系统行业运营模式及发展战略分析报告
- 2024-2030年中国卫生洁净器行业供需状况发展战略规划分析报告
- 2024年生态保育合同范本
- 2024年环保装修材料购买协议3篇
- 微专题构建模型解读新信息-2024高考化学一轮考点击破
- 吕梁职业技术学院《体操类》2023-2024学年第一学期期末试卷
- 2024年样品提供协议范本下载版B版
- 2024年某企业与保险公司关于企业财产保险合同
- 2024年云南省昆明滇中新区公开招聘20人历年(高频重点复习提升训练)共500题附带答案详解
- 医院检验科实验室生物安全程序文件SOP
- STM8S-汇编Word版
- -脑梗塞的最佳治疗中药方剂
- 煤矿企业安全生产信息填报说明
- PCB命名规则详解
- 电活性聚合物5.7
- 物业人必看的一部电影
- 《关于街道政务服务中心工作总结及工作计划》
- 抽油烟机及排烟系统清洗记录表
- MRPERP基本原理
评论
0/150
提交评论