英文文献标准实例:
[1] LELAND W E, WILLINGER W, TAQQU Murad S, et al. On the self-similar nature of Ethernet traffic [J]. Computer Communication Review, 1995, 25(1): 202-213.
[2] ELLIS Daniel R, AIKEN John G, ATTWOOD Kira S, et al. A behavioral approach to worm detection [C]// Proc. of ACM Workshop on Rapid Malcode. New York, USA: ACM, 2004: 43-53.
[3] SIMON D. Optimal state estimation [M]. [S.l.]: John Wiley & Sons Inc., 2006.
[4] MACKAY David J C. Encyclopedia of sparse graph codes [DB/OL]. [2010-02-inference. phy. cam. ac. uk.sixxs.org/mackay/codes/data.html.
[5] NEC Electronics. AZ850 system performance analyzer user manual [M]. [S.l.]: NEC Electronics, 2006.
[6] DAHB Mona Abo El, IINO Shintaro, SHIRAISHI Yoichi, et al. Model based design of inverter power supply[C]// ICROS-SICE International Joint Conference, Fukuoka, Japan: [s.n.], 2009: 2596-2600. 发表文章、投稿、咨询方式: