Writing course for PhD students. Sandy Harris sandy.harris@sjtu.edu.cn (021) 34207008 Office...

Post on 26-Dec-2015

215 views 0 download

Transcript of Writing course for PhD students. Sandy Harris sandy.harris@sjtu.edu.cn (021) 34207008 Office...

Writing course for PhD students

Sandy Harris

sandy.harris@sjtu.edu.cn (021) 34207008

Office 3-518 I am there about 9-4 most days

Help get your papers accepted International journals need good English

My concern is the English Also organisation & flow of the paper

For one conference Submission deadline Monday

I got three papers: #1 -- Friday afternoon #2 -- Saturday #3 -- Monday morning

Read your email I often have questions

Might be longer if I am busy

Word TeX … whatever

Preferably not an archive I would rather have just one file

Needs your professor’s signature Your research funds get billed

Send to sandyinchina@gmail.com I do not usually read SJTU email at home

Don’t count on this

MSN: sandyinchina@hotmail.com

Main email: sandyinchina@gmail.com

Mobile: 15901610681

Canadian Psychology degree

Mid-70s: Amsterdam-India by Volkswagen van Met people who were teaching English

Trained as an English teacher Taught in Iran, Singapore, Saudi Arabia

First as a tool for language teaching Then natural language analysis

Worked on M Phil, computational linguistics U of Birmingham, UK

Did not finish it, did learn Unix

Computer jobs – a bit of everything Mostly writing or training

Unix, QNX, IBM mainframes, PCs

I find these interesting

I wrote the documentation for FreeS/WAN IPsec for Linux

A few other papers

Hi-tech crashed My contract ending, few new ones in sight

My apartment building being torn down Divorced, no wife to persuade

Time to travel again! To Fuzhou as an English teacher

Sometimes English teacher

Sometimes called “computer teacher” = teach Word & Excel? = English lessons with computer

vocabulary?

OK, but …

Edit papers, help get them accepted

My concern is the English Also organisation & flow of the paper

I cannot help much on the technical side Your professors, & journal referees, can

FOLDOC Free Online Dictionary of Computing http://foldoc.org/

Jargon File “The Hacker’s Dictionary” http://www.catb.org/~esr/jargon/

Almost any reading Not stuff written for language learners Interesting stuff – nba.com? vogue.com?

Almost any movies Use English subtitles

Especially the classic papers

News sites and mailing lists Every day: slashdot.org

Also perhaps lighter reading Biography and fiction

“On computable numbers …”

Invents the Turing Machine Solves the halting problem

http://www.abelard.org/turpap2/tp2-ie.asp

“Computing machinery and intelligence”

Invents the Turing Test

http://www.abelard.org/turpap/turpap.php

Andrew Hodges, “Alan Turing: the enigma”

Wartime codebreaker as well as theorist

Much more Turing info on author’s site: http://www.turing.org.uk/

“A Mathematical Theory of Communication” Bell Systems Technical Journal, 1948

Invented information theory

http://plan9.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf

“Communication Theory of Secrecy Systems”

Bell Systems Technical Journal, 1949

Founded modern cryptography Substitution-permutation network Terms: confusion & diffusion http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf

The RSA paper http://people.csail.mit.edu/rivest/Rsapaper.pdf Introduces Alice and Bob

“Nobel Prize” of computing http://awards.acm.org/homepage.cfm?srt=all&awd=140

Reflections on Trusting Trust – Ken Thompson

http://crysp.uwaterloo.ca/courses/cs489/F07-lectures/local/www.acm.org/classics/sep95/

Fred Brooks “The Mythical Man-Month”

Why software projects go wrong Especially large projects!

Old, but still important I have a copy you could borrow

“Structure and Interpretation of Computer Programs”, or SICP

Introduction to programming Uses LISP throughout First year text at MIT

http://mitpress.mit.edu/sicp/

Ross Anderson, “Security Engineering”

1st edition + a few chapters of 2nd online http://www.cl.cam.ac.uk/~rja14/book.html

Second edition in the library?

A=B Hypergeometric functions http://www.math.upenn.edu/~wilf/

AeqB.html

''Handbook of Applied Cryptography'‘ Menezes, van Oorschot, and Vanstone http://www.cacr.math.uwaterloo.ca/hac

''Introduction to Modern Cryptography'‘ Phillip Rogaway and Mihir Bellare http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf

Self-Study Course in Block Cipher Cryptanalysis

http://www.schneier.com/paper-self-study.html

Monthly newsletter http://www.schneier.com/crypto-gram.html

MIT, 2000 courses http://ocw.mit.edu/index.htm

Open Courseware Consuotium http://www.ocwconsortium.org/

China Open Resources for Education http://www.core.org.cn/

Not: Block cipher have many round

Either of: A block cipher has many rounds Block ciphers have many rounds

Good reference: http://www.rpi.edu/dept/llc/writecenter/web/esl.html

This block cipher has 32 rounds The Serpent block cipher has 32 rounds

Some block ciphers have only eight rounds

As we know, … Every coin has two sides, …

At last, we show … Better: Finally, we show …

.. such as … .. for example .. .. including .. .. eg. ..

Never use with a complete list Never followed by “etc.” or “and so on”

Wrong: China has two SARs including Hong Kong and Macau China has two SARs such as Macau and Hong Kong Right: China has two SARs, Macau and Hong Kong

Wrong: China has some big cities such as Shanghai, Chongqing,

etc. Right: China has some big cities such as Shanghai and Chongqing

Only used when there are two lists Always at the end

Alice, Betty and Clara married Robert, Sam and Tom, respectively.

Alice married Robert Betty married Sam Clara married Tom

First time: Impossible differential cryptanalysis a Xilinx XUPV5-LX110T development board

Later: .. the method, the board, this, it, …

Section Two analyzes… In Section 3, we look at … The … of … is discussed in Section Four Section five presents an analysis of …

Section Two analyzes… Section Three describes … Section Four discusses … Section Five presents an analysis of OR: In Section Two we analyze… In Section Three we describe … In Section Four we discuss … In Section Five we present an analysis of …

Not this: Consumption of input is followed by

executing a sequence of ordered operations (behavior), which ends with the delivery of the function's output.

Consumption of input is followed by execution of a sequence of ordered operations (behavior), which ends with the delivery of the function's output.

All three parts have a similar structure

◦Input is consumed, then a sequence of ordered operations (behavior) is executed, and finally the function's output is delivered.

◦Use the verbs where possible◦“consume”, “execute”, “deliver”, ..

◦Avoid nouns derived from the verbs◦“consumption”, “execution” and

“delivery”

The service consumes input, then executes a sequence of ordered operations (behavior), and finally delivers its output.

Use active verbs where possible

Keep it short No details required

The abstract is just advertising You want them to read your paper!

There are an infinite number of primes There is no largest prime number

Euclid’s proof

New technique/notation – factorials

Write the abstract