Similar documents
清华大学学位论文 LaTeX 模板使用示例文档

清华大学学位论文 LaTeX 模板使用示例文档 v5.3.1


ENGG1410-F Tutorial 6


中国科学技术大学学位论文模板示例文档

mode of puzzle-solving


國立中山大學學位論文典藏.PDF

Microsoft Word doc

C60表面的纳米形貌的可控性转变兼论LaTeX在论文排版中的运用

UDC Empirical Researches on Pricing of Corporate Bonds with Macro Factors 厦门大学博硕士论文摘要库

Microsoft Word 谢雯雯.doc

Microsoft Word - Alan Jameson's Master's Thesis.pdf

XML SOAP DOM B2B B/S B2B B2B XML SOAP


Microsoft Word - A doc

untitled

2/80 2

Introduction to Hamilton-Jacobi Equations and Periodic Homogenization

Microsoft Word - ä¸fi颟æ−¥å‚−_å“ı弋论_1104


微 分 方 程 是 经 典 数 学 的 一 个 重 要 分 支, 常 用 来 描 述 随 时 间 变 化 的 动 态 系 统, 被 广 泛 应 用 于 物 理 学 工 程 数 学 和 经 济 学 等 领 域. 实 际 上, 系 统 在 随 时 间 的 变 化 过 程 中, 经 常 会 受 到 一 些

Shanghai International Studies University THE STUDY AND PRACTICE OF SITUATIONAL LANGUAGE TEACHING OF ADVERB AT BEGINNING AND INTERMEDIATE LEVEL A Thes

論文寫作技巧

東吳大學

Public Projects A Thesis Submitted to Department of Construction Engineering National Kaohsiung First University of Science and Technology In Partial


University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of

A dissertation for Master s degree Metro Indoor Coverage Systems Analysis And Design Author s Name: Sheng Hailiang speciality: Supervisor:Prof.Li Hui,

硕 士 学 位 论 文 论 文 题 目 : 北 岛 诗 歌 创 作 的 双 重 困 境 专 业 名 称 : 中 国 现 当 代 文 学 研 究 方 向 : 中 国 新 诗 研 究 论 文 作 者 : 奚 荣 荣 指 导 老 师 : 姜 玉 琴 2014 年 12 月

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

UDC The Policy Risk and Prevention in Chinese Securities Market

WTO

A VALIDATION STUDY OF THE ACHIEVEMENT TEST OF TEACHING CHINESE AS THE SECOND LANGUAGE by Chen Wei A Thesis Submitted to the Graduate School and Colleg

\\Lhh\07-02\黑白\内页黑白1-16.p

PowerPoint Presentation

Microsoft Word - 专论综述1.doc

致 谢 本 论 文 能 得 以 完 成, 首 先 要 感 谢 我 的 导 师 胡 曙 中 教 授 正 是 他 的 悉 心 指 导 和 关 怀 下, 我 才 能 够 最 终 选 定 了 研 究 方 向, 确 定 了 论 文 题 目, 并 逐 步 深 化 了 对 研 究 课 题 的 认 识, 从 而 一

Microsoft Word - 07.docx

致 谢 开 始 这 篇 致 谢 的 时 候, 以 为 这 是 最 轻 松 最 愉 快 的 部 分, 而 此 时 心 头 却 充 满 了 沉 甸 甸 的 回 忆 和 感 恩, 一 时 间 竟 无 从 下 笔 虽 然 这 远 不 是 一 篇 完 美 的 论 文, 但 完 成 这 篇 论 文 要 感 谢

Untitled-3

國立中山大學學位論文典藏.PDF


untitled

文档 9

2009 Japanese First Language Written examination

致 谢 本 人 自 2008 年 6 月 从 上 海 外 国 语 大 学 毕 业 之 后, 于 2010 年 3 月 再 次 进 入 上 外, 非 常 有 幸 成 为 汉 语 国 际 教 育 专 业 的 研 究 生 回 顾 三 年 以 来 的 学 习 和 生 活, 顿 时 感 觉 这 段 时 间 也

南華大學數位論文

,, :, ;,,?, : (1), ; (2),,,, ; (3),,, :,;; ;,,,,(Markowitz,1952) 1959 (,,2000),,, 20 60, ( Evans and Archer,1968) ,,,

Construction of Chinese pediatric standard database A Dissertation Submitted for the Master s Degree Candidate:linan Adviser:Prof. Han Xinmin Nanjing

豐佳燕.PDF

50% SWEET 甜 蜜 五 分 仔 - 橋 頭 糖 廠 紀 念 商 品 開 發 設 計 之 研 究 50% SWEET - The Study on the Development and Design of Souvenirs of Qiao Tou Sugar Plant 研 究 生 : 陳


2009 Korean First Language Written examination

國立中山大學學位論文典藏.PDF

A Study on JI Xiaolan s ( ) Life, Couplets and Theories of Couplets 紀 曉 嵐 ( ) 生 平 資 料 斠 正 及 對 聯 聯 論 研 究 LI Ha 李 夏 THE UNIVER

a b

2010 Japanese First Language Written examination

Microsoft PowerPoint - STU_EC_Ch08.ppt

20

Microsoft Word - 論文封面 修.doc


Microsoft PowerPoint - CH 04 Techniques of Circuit Analysis

2013国际营销科学与信息技术大会(MSIT2013)

我国原奶及乳制品安全生产和质量安全管理研究

2015 Chinese FL Written examination

穨423.PDF


Abstract Since 1980 s, the Coca-Cola came into China and developed rapidly. From 1985 to now, the numbers of bottlers has increased from 3 to 23, and

~ ~

~ ~ ~

096STUT DOC

g 100mv /g 0. 5 ~ 5kHz 1 YSV8116 DASP 1 N 2. 2 [ M] { x } + [ C] { x } + [ K]{ x } = { f t } 1 M C K 3 M C K f t x t 1 [ H( ω )] = - ω 2

Vol. 36 ( 2016 ) No. 6 J. of Math. (PRC) HS, (, ) :. HS,. HS. : ; HS ; ; Nesterov MR(2010) : 90C05; 65K05 : O221.1 : A : (2016)

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO

untitled


國家圖書館典藏電子全文

國立臺南大學數位論文典藏.pdf

36

输电线路智能监测系统通信技术应用研究

Microsoft Word - A doc

穨control.PDF

摘 要 張 捷 明 是 台 灣 當 代 重 要 的 客 語 兒 童 文 學 作 家, 他 的 作 品 記 錄 著 客 家 人 的 思 想 文 化 與 觀 念, 也 曾 榮 獲 多 項 文 學 大 獎 的 肯 定, 對 台 灣 這 塊 土 地 上 的 客 家 人 有 著 深 厚 的 情 感 張 氏 於

M M. 20

Microsoft Word - Final Exam Review Packet.docx

216 年 8 月 市 场 概 述 216 年 月 日, 通 州 出 台 了 商 住 限 购 新 政, 规 定 新 建 商 业 办 公 项 目 应 当 按 照 规 划 用 途 销 售, 并 只 能 出 售 给 企 事 业 单 位 或 社 会 组 织, 且 上 述 单 位 购 买 后 再 出 售 时,

Microsoft PowerPoint - TTCN-Introduction-v5.ppt


A Study on Innovative Value Adding Model of New Building The Case Study of The Crystal House in Taichung StudentChen-Tair HUANG AdvisorDr.Chyan YANG A

The Development of Color Constancy and Calibration System

市 场 综 述 三 季 度, 上 海 投 资 市 场 交 易 量 持 续 攀 升, 共 有 八 宗 主 要 交 易 达 成, 交 易 金 额 共 计 人 民 币 160 亿 元, 环 比 增 长 59% 投 资 者 尤 其 是 国 际 投 资 者, 逐 渐 增 购 租 金 收 入 稳 定 的 核 心

1

<4D F736F F D20BCFAA755AAA92DABC8AE61AAE1A5ACB2A3B77EB56FAE69A4A7ACE3A873A147A548B8EAB7BDB0F2C2A6AABAC65BC2492E646F63>

Microsoft Word 記錄附件

南華大學數位論文

<4D F736F F D20B5DAC8FDB7BDBE57C9CFD6A7B8B6D6AEB7A8C2C98696EE7DCCBDBEBF2E646F63>

附件4

Transcription:

L A T E X

An Introduction to L A T E X Thesis Template of Tsinghua University Dissertation Submitted to Tsinghua University in partial fulfillment of the requirement for the degree of Doctor of Engineering by Xue Ruini ( Computer Science and Technology ) Dissertation Supervisor : Associate Supervisor : Professor Zheng Weimin Chen Wenguang February, 2009

1 2 3

1 2 ThuThesis 5 TEX L A TEX CJK I

Abstract Abstract An abstract of a dissertation is a summary and extraction of research work and contributions. Included in an abstract should be description of research topic and research objective, brief introduction to methodology and research process, and summarization of conclusion and contributions of the research. An abstract should be characterized by independence and clarity and carry identical information with the dissertation. It should be such that the general idea and major contributions of the dissertation are conveyed without reading the dissertation. An abstract should be concise and to the point. It is a misunderstanding to make an abstract an outline of the dissertation and words the first chapter, the second chapter and the like should be avoided in the abstract. Key words are terms used in a dissertation for indexing, reflecting core information of the dissertation. An abstract may contain a maximum of 5 key words, with semicolons used in between to separate one another. Key words: TEX; L A TEX; CJK; template; thesis II

1 English...1 1.1...1 1.2...1 1.3...3 1.3.1...3 1.3.2...3 1.3.3...7 1.4...8 1.5... 12 1.6... 12 1.7... 13 2... 14 2.1... 14 2.1.1... 14 2.1.2... 14... 17... 19 A... 20 A.1 Single-Objective Programming... 20 A.1.1 Linear Programming... 21 A.1.2 Nonlinear Programming... 22 A.1.3 Integer Programming... 23 B... 25 B.1... 25 B.1.1... 25 B.1.2... 26 B.1.3... 26 C... 27 III

... 28 IV

HPC cluster Itanium SMP API PI MPI PBI MPBI PY PMDA-BDA G χ E m c P T v (High Performance Computing) N- N- (Activation Free Energy) (Transmission Coefficient) V

VI

1 English 1 English ThuThesis ThuThesis 1 1.1 cover.tex denation.tex appendix01.tex resume.tex 2 1.2 1037-1101 1 2 768-824 1

1 English 2

1 English 1.3 1.3.1 booktabs array longtabular \hlinewd booktabs \toprule \midrule \bottomrule longtable hlinewd{xpt} 1.1 chapter thuthesis.ins thuthesis.dtx thuthesis.cls thuthesis.cfg thubib.bst thutils.sty L A TEX docstrip 1 2 cls cfg Bibtex 1 2 1.1 L A TEX \footnote 1.3.2 1.2 3

1 English 1.2 1 y First Half Second Half x 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr East 20.4 27.4 90 20.4 West 30.6 38.6 34.6 31.6 ThuThesis * ** 1.2 1 tabularx X 2 \backslashbox 1 2 1.3 1.4 1.5 2.1.2.2 1.3 1.4 111 222 222 333 111 222 222 333 4

1 English 1.5 (a) 111 222 222 333 (b) 111 222 222 333 L A TEX 1.6 1.6 2 Network Topology # of nodes # of clients Server Waxman GT-ITM 600 Transit-Stub 2% 10% 50% Max. Connectivity Inet-2.1 6000 Rui Ni Xue ThuThesis ABCDEF 5

1 English TEX/L A TEX Word L A TEX longtable supertabular longtable 1.7 longtable 1.7 (s) (s) (s) (s) (s) KB CG.A.2 23.05 0.002 0.116 0.035 0.589 32491 CG.A.4 15.06 0.003 0.067 0.021 0.351 18211 CG.A.8 13.38 0.004 0.072 0.023 0.210 9890 CG.B.2 867.45 0.002 0.864 0.232 3.256 228562 CG.B.4 501.61 0.003 0.438 0.136 2.075 123862 CG.B.8 384.65 0.004 0.457 0.108 1.235 63777 6

1 English 1.7 (s) (s) (s) (s) (s) KB MG.A.2 112.27 0.002 0.846 0.237 3.930 236473 MG.A.4 59.84 0.003 0.442 0.128 2.070 123875 MG.A.8 31.38 0.003 0.476 0.114 1.041 60627 MG.B.2 526.28 0.002 0.821 0.238 4.176 236635 MG.B.4 280.11 0.003 0.432 0.130 1.706 123793 MG.B.8 148.29 0.003 0.442 0.116 0.893 60600 LU.A.2 2116.54 0.002 0.110 0.030 0.532 28754 LU.A.4 1102.50 0.002 0.069 0.017 0.255 14915 LU.A.8 574.47 0.003 0.067 0.016 0.192 8655 LU.B.2 9712.87 0.002 0.357 0.104 1.734 101975 LU.B.4 4757.80 0.003 0.190 0.056 0.808 53522 LU.B.8 2444.05 0.004 0.222 0.057 0.548 30134 EP.A.2 123.81 0.002 0.010 0.003 0.074 1834 EP.A.4 61.92 0.003 0.011 0.004 0.073 1743 EP.A.8 31.06 0.004 0.017 0.005 0.073 1661 EP.B.2 495.49 0.001 0.009 0.003 0.196 2011 EP.B.4 247.69 0.002 0.012 0.004 0.122 1663 EP.B.8 126.74 0.003 0.017 0.005 0.083 1656 1.3.3 \caption*{} XX XX L A TEX \caption* 1.111 1.111 7

1 English 1.111 ThuThesis Figure 1.111 773-819 1 2 1 2 1.4 1.1 c = a 2 b 2 (1-1) = (a + b)(a b) (1-2) 1.1 8

1 English 1.1 1.1 φ(x, z) = z γ 10 x γ mn x m z n = z Mr 1 x Mr (m+n) x m z n ζ 0 = (ξ 0 ) 2, (1-3) ζ 1 = ξ 0 ξ 1, (1-4) ζ 2 = (ξ 1 ) 2, (1-5) 1.1 x y + 1 (mod m 2 ) (1-6) x y + 1 mod m 2 (1-7) x y + 1 (m 2 ) (1-8) 9

1 English 1.1 b { b } [ f (x) 2 g(y) 2 + f (y) 2 g(x) 2 ] 2 f (x)g(x) f (y)g(y) dx dy a a b b b b } = {g(y) 2 f 2 + f (y) 2 g 2 2 f (y)g(y) f g dy a a a a 1.1 y = 1 y = 0 (1-9a) (1-9b) 10

1 English 1.1 V i = v i q i v j, X i = x i q i x j, U i = u i, for i j; (1-10) V j = v j, X j = x j, U j u j + q i u i. (1-11) i j 1.1 f (x ) p λ j g j (x ) = 0 j=1 λ j g j (x ) = 0, j = 1, 2,, p λ j 0, j = 1, 2,, p. (1-12) 1.1 Andrew S. Tanenbaum W. Richard Stevens 1.1 Poincare Conjecture If in a closed three-dimensional space, any closed curves can shrink to a point continuously, this space can be deformed to a sphere. 1.1 1.1 label ref 11

1 English 1.5 bibitem BIBTEX thubib.bst [1 3] [4 6] [7 9] [10,11] [12,13] [14] [15,16] [17] [18] lang= zh bst [19] bbl [12] 1.6 (1-13) p(y x) p(x) p(x) p(y x) = p(x, y) p(x) = p(x y)p(y) p(x) (1-13) TEX happy amsmath det K(t = 1, t 1,..., t n ) = I n ( 1) I i I t i (D j + λ j t j ) det A (λ) (I I) = 0. (1-14) j I amsmath b a { b a } [ f (x) 2 g(y) 2 + f (y) 2 g(x) 2 ] 2 f (x)g(x) f (y)g(y) dx dy b b b b } = {g(y) 2 f 2 + f (y) 2 g 2 2 f (y)g(y) f g dy a a a a 12

1 English max F(x, y x 1, y 2,, y m) subject to: G(x) 0 (y 1, y 2,, y m) solves problems (i = 1, 2,, m) max f i (x, y 1, y 2,, y m ) y i subject to: g i (x, y 1, y 2,, y m ) 0. (1-15) 1.7 \pozhehao (1) (2) paralist \itemsep paralist 13

2 2 2.1 1 (1-13) p(y x) = p(x, y) p(x) = p(x y)p(y) p(x) (2-1) 2.1.1 pstricks pgf pgf Postscript L A TEX GUI XFig(jFig), WinFig, Tpx, Ipe, Dia, Inkscape, LaTeXPiX, jpicedt, jaxdraw 2.1.2 L A TEX 2ε subfig 2.1.2.1 1 L A TEX float [H] 2.1 Hello, Xfig! LittleLeo 2.1 Xfig 1 This is not a bug, but a feature of L A TEX! 14

2 (a) (b) caption 2.2 2.1.2.2 minipage parbox 2.2 2.2(a) 2.2(b) \subfloat \subfigure \subtable 15

2 2.3 2.4 16

[1] Knuth D E. The TEX Book. 15th ed., Reading, MA: Addison-Wesley Publishing Company, 1989. [2] Goosens M, Mittelbach F, Samarin A. The L A TEX Companion. Reading, MA: Addison- Wesley Publishing Company, 1994: 112 125. [3] Gröning P, Nilsson L, Ruffieux P, et al. Encyclopedia of Nanoscience and Nanotechnology, volume 1. American Scientific Publishers, 2004: 547 579. [4] Krasnogor N. Towards robust memetic algorithms. In: Hart W, Krasnogor N, Smith J, (eds.). Proceedings of Recent Advances in Memetic Algorithms. New York: Springer Berlin Heidelberg, 2004: 185 207. [5].., 2001: 185 207. [6].. :,,,.. :, 1998: 65 69. [7] Chafik El Idrissi M, Roney A, Frigon C, et al. Measurements of total kinetic-energy released to the N = 2 dissociation limit of H 2 evidence of the dissociation of very high vibrational Rydberg states of H 2 by doubly-excited states. Chemical Physics Letters, 1994, 224(10):260 266. [8] Mellinger A, Vidal C R, Jungen C. Laser reduced fluorescence study of the carbon-monoxide nd triplet Rydberg series-experimental results and multichannel quantum-defect analysis. J. Chem. Phys., 1996, 104(5):8913 8921. [9] Shell M. How to Use the IEEEtran L A TEX Class. Journal of L A TEX Class Files, 2002, 12(4):100 120. [10]. [ ]. :, 2005. [11] Jeyakumar A R. Metamori: A library for Incremental File Checkpointing[M]. Blacksburg: Virgina Tech, June 21, 2004. [12]. [ ]. :, 2005. [13] Zadok E. FiST: A System for Stackable File System Code Generation[D]. USA: Computer Science Department, Columbia University, May, 2001. [14] IEEE Std 1363-2000. IEEE Standard Specifications for Public-Key Cryptography. New York: IEEE, 2000. [15] Kim S, Woo N, Yeom H Y, et al. Design and Implementation of Dynamic Process Management for Grid-enabled MPICH. Proceedings of the 10th European PVM/MPI Users Group Conference, Venice, Italy, 2003. 17

[16] Kocher C, Jaffe J, Jun B. Differential Power Analysis. In: Wiener M, (eds.). Proceedings of Advances in Cryptology (CRYPTO 99), volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, 1999. 388 397. [17] Woo A, Bailey D, Yarrow M, et al. The NAS Parallel Benchmarks 2.0. Technical report, The Pennsylvania State University CiteSeer Archives, December 05, 1995. http://www.nasa.org/. [18],,,.., 1800, 224:260 266. [19],,,.. N,,, 2006. 18

xxx xxx xxx xx xx ThuThesis 19

A A As one of the most widely used techniques in operations research, mathematical programming is defined as a means of maximizing a quantity known as objective function, subject to a set of constraints represented by equations and inequalities. Some known subtopics of mathematical programming are linear programming, nonlinear programming, multiobjective programming, goal programming, dynamic programming, and multilevel programming [1]. It is impossible to cover in a single chapter every concept of mathematical programming. This chapter introduces only the basic concepts and techniques of mathematical programming such that readers gain an understanding of them throughout the book [2,3]. A.1 Single-Objective Programming The general form of single-objective programming (SOP) is written as follows, max f (x) subject to: (123) g j (x) 0, j = 1, 2,, p which maximizes a real-valued function f of x = (x 1, x 2,, x n ) subject to a set of constraints. Definition A.1 In SOP, we call x a decision vector, and x 1, x 2,, x n decision variables. The function f is called the objective function. The set S = { x R n g j (x) 0, j = 1, 2,, p } (456) is called the feasible set. An element x in S is called a feasible solution. 20

A Definition A.2 A feasible solution x is called the optimal solution of SOP if and only if f (x ) f (x) (A-1) for any feasible solution x. One of the outstanding contributions to mathematical programming was known as the Kuhn-Tucker conditionsa-2. In order to introduce them, let us give some definitions. An inequality constraint g j (x) 0 is said to be active at a point x if g j (x ) = 0. A point x satisfying g j (x ) 0 is said to be regular if the gradient vectors g j (x) of all active constraints are linearly independent. Let x be a regular point of the constraints of SOP and assume that all the functions f (x) and g j (x), j = 1, 2,, p are differentiable. If x is a local optimal solution, then there exist Lagrange multipliers λ j, j = 1, 2,, p such that the following Kuhn- Tucker conditions hold, f (x ) p λ j g j (x ) = 0 j=1 λ j g j (x ) = 0, j = 1, 2,, p (A-2) λ j 0, j = 1, 2,, p. If all the functions f (x) and g j (x), j = 1, 2,, p are convex and differentiable, and the point x satisfies the Kuhn-Tucker conditions (A-2), then it has been proved that the point x is a global optimal solution of SOP. A.1.1 Linear Programming If the functions f (x), g j (x), j = 1, 2,, p are all linear, then SOP is called a linear programming. The feasible set of linear is always convex. A point x is called an extreme point of convex set S if x S and x cannot be expressed as a convex combination of two points in S. It has been shown that the optimal solution to linear programming corresponds to an extreme point of its feasible set provided that the feasible set S is bounded. This 21

A fact is the basis of the simplex algorithm which was developed by Dantzig as a very efficient method for solving linear programming. Table 1 of tables This is an example for manually numbered table, which would not appear in the list Network Topology # of nodes # of clients Server Waxman GT-ITM 600 Transit-Stub 2% 10% 50% Max. Connectivity Inet-2.1 6000 Rui Ni Xue ThuThesis ABCDEF Roughly speaking, the simplex algorithm examines only the extreme points of the feasible set, rather than all feasible points. At first, the simplex algorithm selects an extreme point as the initial point. The successive extreme point is selected so as to improve the objective function value. The procedure is repeated until no improvement in objective function value can be made. The last extreme point is the optimal solution. A.1.2 Nonlinear Programming If at least one of the functions f (x), g j (x), j = 1, 2,, p is nonlinear, then SOP is called a nonlinear programming. A large number of classical optimization methods have been developed to treat special-structural nonlinear programming based on the mathematical theory concerned with analyzing the structure of problems. Figure 1 list of figures This is an example for manually numbered figure, which would not appear in the Now we consider a nonlinear programming which is confronted solely with maximizing a real-valued function with domain R n. Whether derivatives are available or 22

A not, the usual strategy is first to select a point in R n which is thought to be the most likely place where the maximum exists. If there is no information available on which to base such a selection, a point is chosen at random. From this first point an attempt is made to construct a sequence of points, each of which yields an improved objective function value over its predecessor. The next point to be added to the sequence is chosen by analyzing the behavior of the function at the previous points. This construction continues until some termination criterion is met. Methods based upon this strategy are called ascent methods, which can be classified as direct methods, gradient methods, and Hessian methods according to the information about the behavior of objective function f. Direct methods require only that the function can be evaluated at each point. Gradient methods require the evaluation of first derivatives of f. Hessian methods require the evaluation of second derivatives. In fact, there is no superior method for all problems. The efficiency of a method is very much dependent upon the objective function. A.1.3 Integer Programming Integer programming is a special mathematical programming in which all of the variables are assumed to be only integer values. When there are not only integer variables but also conventional continuous variables, we call it mixed integer programming. If all the variables are assumed either 0 or 1, then the problem is termed a zero-one programming. Although integer programming can be solved by an exhaustive enumeration theoretically, it is impractical to solve realistically sized integer programming problems. The most successful algorithm so far found to solve integer programming is called the branch-and-bound enumeration developed by Balas (1965) and Dakin (1965). The other technique to integer programming is the cutting plane method developed by Gomory (1959). Uncertain Programming (BaoDing Liu, 2006.2) 23

A References NOTE: these references are only for demonstration, they are not real citations in the original text. [1] Donald E. Knuth. The TEXbook. Addison-Wesley, 1984. ISBN: 0-201-13448-9 [2] Paul W. Abrahams, Karl Berry and Kathryn A. Hargreaves. TEX for the Impatient. Addison-Wesley, 1990. ISBN: 0-201-51375-7 [3] David Salomon. The advanced TEXbook. New York : Springer, 1995. ISBN:0-387-94556-3 24

B B B.1 p(y x) = p(x, y) p(x) = p(x y)p(y) p(x) (123) B.1.1 1 Network Topology # of nodes # of clients Server Waxman GT-ITM 600 Transit-Stub 2% 10% 50% Max. Connectivity Inet-2.1 6000 Rui Ni Xue ThuThesis ABCDEF 25

B B.1.2 Hello, Xfig! LittleLeo 1 B.1.3 26

C C \input 27

xxxx xx xx xx xx xxxx 9 xx xx xx xxxx 7 xx xxxx 9 xx xx xx [1] Yang Y, Ren T L, Zhang L T, et al. Miniature microphone with silicon- based ferroelectric thin films. Integrated Ferroelectrics, 2003, 52:229-235. (SCI, :758FZ.) [2],,,.., 2005, 16(14):1289-1291. (EI, :0534931 2907.) [3],,,.., 2003, 24(S4):192-193. (EI.) [4] Yang Y, Ren T L, Zhu Y P, et al. PMUTs for handwriting recognition. In press. ( Integrated Ferroelectrics. SCI.) [5] Wu X M, Yang Y, Cai J, et al. Measurements of ferroelectric MEMS microphones. Integrated Ferroelectrics, 2005, 69:417-429. (SCI, :896KM.) [6],,,.., 2006, 28(1):117-119. (EI, :06129773469.) [7],,,. MEMS., 2003, 53:59-61. 28

[1],,,. :, CN1602118A. (.) [2] Ren T L, Yang Y, Zhu Y P, et al. Piezoelectric micro acoustic sensor based on ferroelectric materials: USA, No.11/215, 102. (.) 29