計(jì)算機(jī)專業(yè)科技論文寫(xiě)作必備技巧課件_第1頁(yè)
計(jì)算機(jī)專業(yè)科技論文寫(xiě)作必備技巧課件_第2頁(yè)
計(jì)算機(jī)專業(yè)科技論文寫(xiě)作必備技巧課件_第3頁(yè)
計(jì)算機(jī)專業(yè)科技論文寫(xiě)作必備技巧課件_第4頁(yè)
計(jì)算機(jī)專業(yè)科技論文寫(xiě)作必備技巧課件_第5頁(yè)
已閱讀5頁(yè),還剩41頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、1Paper Writing2Paper Writing Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work3Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contri

2、butions (1 paragraph) Experiment Overview Roadmap (1 paragraph)4BackgroundTopicBackgroundTopicTime OrientedApplication Oriented Concept, Characteristics, Application, Importance, and etc.5BackgroundTopic6Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algori

3、thm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)7Literature ReviewMotivation Notable Method Summarization (Focus on nearest neighbors) Comments (Weakness) Motivation (against the weakness)8Literature ReviewMotivation9Introduction Background Topic (1-2

4、paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)10Algorithm Overview & Contribution Method Definition Principle Description Contribution11Algorithm Overview & Contribution12Contributions New

5、Concept New Model New Algorithm (More Efficient, Less Memory, Parallelism and etc.) New Result (Significant in Application Domain)13Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overvi

6、ew Roadmap (1 paragraph)14Experiment Overview Implementation Data Result15Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)16Roadmap17Five Main Sections Abst

7、ract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work18Related Work (Main Content) Detail some notable works Give comments individually or by group Summarize irrelevant works in a few words In time or advancing order

8、 Try to put the methods to compare late.192021Related Work (Supplement) Add the head There are plenty of covert channel methods in literature. Here, we will only review some notable work due to space limitation. Now (Here/ In this section), we will review some notable methods (previous work)22Relate

9、d Work (Supplement) Add the tail Hence, we are motivated to23Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work24Preliminaries Applying to paper with lots of definitions Three Components: Ov

10、erview Definitions Problem Definition 2526Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work27Algorithm (Method) Overview Preliminaries (Definitions, Model Description) Put the whole idea in

11、 Phases or Steps Emphases which phase/step/part makes the algorithm outstanding Use running examples, figures, tables, pseudo-code. Supplementary (limitations, suggestions, future work)28Algorithm (Overview)29Algorithm (Main Content) Phase 1 Step 1 Step 2 Phase 2 In the 1st step In the 2nd step Phas

12、e 3 30Algorithm (Try to Make it Clear)Alice and Bob would take the following five steps to transmit the secret message:Step 1: Alice and Bob communicate normally. They both record the message lengths sent by Alice, and make the record as Reference.Step 2: Alice and Bob select a length l from the Ref

13、erence by the same random algorithm. Step 3: In the ith sending, Alice sends to Bob a message of length lnext =l+SUMi. The Reference is updated by appending lnext. Step 4: Bob decodes the ith message into Wi by subtracting l from lnext.In our method, the Step 2 and 3 ensure that each sending message

14、 would learn from the normal network traffic (Reference) so that messages from our channel have similar length distribution as normal network messages. To better resist the detection, our scheme could be further enhanced through the way that Alice periodically sends to Bob redundant normal network m

15、essages during the transmission.31Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work32Experimental Results Overview: environment, data, methods to compare Data Description Data Preprocessing

16、 Compare against Other Algorithms (Methods) Parameter Studies33Experimental ResultsExperimenting on the Clartnet dataset 9, we compared our scheme with Girlings3 and Yaos8 models, and estimated the upper bound of our models bandwidth.4.1 DatasetClarknet dataset contains the logs of 1.6 million HTTP

17、queries from two weeks. We take the 7239 queries from Client as the messages for our experiments. In each query, the average size of transmitted message is 489 bytes (39 bytes message + 450 bytes header).34Experimental Results35Five Main Sections Abstract, Keywords Introduction Related Work (Literat

18、ure Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work36Conclusion & Future Work Summarize what we did in the paper Method Experimental Results Advantage (Application) Future Work37Conclusion & Future Work38Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorit

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論