Writing course for PhD students. Sandy Harris [email protected] (021) 34207008 Office...
-
Upload
scarlett-montgomery -
Category
Documents
-
view
215 -
download
0
Transcript of Writing course for PhD students. Sandy Harris [email protected] (021) 34207008 Office...
Writing course for PhD students
Help get your papers accepted International journals need good English
My concern is the English Also organisation & flow of the paper
For one conference Submission deadline Monday
I got three papers: #1 -- Friday afternoon #2 -- Saturday #3 -- Monday morning
Read your email I often have questions
Might be longer if I am busy
Word TeX … whatever
Preferably not an archive I would rather have just one file
Needs your professor’s signature Your research funds get billed
Send to [email protected] I do not usually read SJTU email at home
Don’t count on this
Canadian Psychology degree
Mid-70s: Amsterdam-India by Volkswagen van Met people who were teaching English
Trained as an English teacher Taught in Iran, Singapore, Saudi Arabia
First as a tool for language teaching Then natural language analysis
Worked on M Phil, computational linguistics U of Birmingham, UK
Did not finish it, did learn Unix
Computer jobs – a bit of everything Mostly writing or training
Unix, QNX, IBM mainframes, PCs
I find these interesting
I wrote the documentation for FreeS/WAN IPsec for Linux
A few other papers
Hi-tech crashed My contract ending, few new ones in sight
My apartment building being torn down Divorced, no wife to persuade
Time to travel again! To Fuzhou as an English teacher
Sometimes English teacher
Sometimes called “computer teacher” = teach Word & Excel? = English lessons with computer
vocabulary?
OK, but …
Edit papers, help get them accepted
My concern is the English Also organisation & flow of the paper
I cannot help much on the technical side Your professors, & journal referees, can
FOLDOC Free Online Dictionary of Computing http://foldoc.org/
Jargon File “The Hacker’s Dictionary” http://www.catb.org/~esr/jargon/
Almost any reading Not stuff written for language learners Interesting stuff – nba.com? vogue.com?
Almost any movies Use English subtitles
Especially the classic papers
News sites and mailing lists Every day: slashdot.org
Also perhaps lighter reading Biography and fiction
“On computable numbers …”
Invents the Turing Machine Solves the halting problem
http://www.abelard.org/turpap2/tp2-ie.asp
“Computing machinery and intelligence”
Invents the Turing Test
http://www.abelard.org/turpap/turpap.php
Andrew Hodges, “Alan Turing: the enigma”
Wartime codebreaker as well as theorist
Much more Turing info on author’s site: http://www.turing.org.uk/
“A Mathematical Theory of Communication” Bell Systems Technical Journal, 1948
Invented information theory
http://plan9.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf
“Communication Theory of Secrecy Systems”
Bell Systems Technical Journal, 1949
Founded modern cryptography Substitution-permutation network Terms: confusion & diffusion http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
The RSA paper http://people.csail.mit.edu/rivest/Rsapaper.pdf Introduces Alice and Bob
“Nobel Prize” of computing http://awards.acm.org/homepage.cfm?srt=all&awd=140
Reflections on Trusting Trust – Ken Thompson
http://crysp.uwaterloo.ca/courses/cs489/F07-lectures/local/www.acm.org/classics/sep95/
Fred Brooks “The Mythical Man-Month”
Why software projects go wrong Especially large projects!
Old, but still important I have a copy you could borrow
“Structure and Interpretation of Computer Programs”, or SICP
Introduction to programming Uses LISP throughout First year text at MIT
http://mitpress.mit.edu/sicp/
Ross Anderson, “Security Engineering”
1st edition + a few chapters of 2nd online http://www.cl.cam.ac.uk/~rja14/book.html
Second edition in the library?
A=B Hypergeometric functions http://www.math.upenn.edu/~wilf/
AeqB.html
''Handbook of Applied Cryptography'‘ Menezes, van Oorschot, and Vanstone http://www.cacr.math.uwaterloo.ca/hac
''Introduction to Modern Cryptography'‘ Phillip Rogaway and Mihir Bellare http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf
Self-Study Course in Block Cipher Cryptanalysis
http://www.schneier.com/paper-self-study.html
Monthly newsletter http://www.schneier.com/crypto-gram.html
MIT, 2000 courses http://ocw.mit.edu/index.htm
Open Courseware Consuotium http://www.ocwconsortium.org/
China Open Resources for Education http://www.core.org.cn/
Not: Block cipher have many round
Either of: A block cipher has many rounds Block ciphers have many rounds
Good reference: http://www.rpi.edu/dept/llc/writecenter/web/esl.html
This block cipher has 32 rounds The Serpent block cipher has 32 rounds
Some block ciphers have only eight rounds
As we know, … Every coin has two sides, …
At last, we show … Better: Finally, we show …
.. such as … .. for example .. .. including .. .. eg. ..
Never use with a complete list Never followed by “etc.” or “and so on”
Wrong: China has two SARs including Hong Kong and Macau China has two SARs such as Macau and Hong Kong Right: China has two SARs, Macau and Hong Kong
Wrong: China has some big cities such as Shanghai, Chongqing,
etc. Right: China has some big cities such as Shanghai and Chongqing
Only used when there are two lists Always at the end
Alice, Betty and Clara married Robert, Sam and Tom, respectively.
Alice married Robert Betty married Sam Clara married Tom
First time: Impossible differential cryptanalysis a Xilinx XUPV5-LX110T development board
Later: .. the method, the board, this, it, …
Section Two analyzes… In Section 3, we look at … The … of … is discussed in Section Four Section five presents an analysis of …
Section Two analyzes… Section Three describes … Section Four discusses … Section Five presents an analysis of OR: In Section Two we analyze… In Section Three we describe … In Section Four we discuss … In Section Five we present an analysis of …
Not this: Consumption of input is followed by
executing a sequence of ordered operations (behavior), which ends with the delivery of the function's output.
Consumption of input is followed by execution of a sequence of ordered operations (behavior), which ends with the delivery of the function's output.
All three parts have a similar structure
◦Input is consumed, then a sequence of ordered operations (behavior) is executed, and finally the function's output is delivered.
◦Use the verbs where possible◦“consume”, “execute”, “deliver”, ..
◦Avoid nouns derived from the verbs◦“consumption”, “execution” and
“delivery”
The service consumes input, then executes a sequence of ordered operations (behavior), and finally delivers its output.
Use active verbs where possible
Keep it short No details required
The abstract is just advertising You want them to read your paper!
There are an infinite number of primes There is no largest prime number
Euclid’s proof
New technique/notation – factorials
Write the abstract