Lab 3 - Research Project

Due: Wednesday at 5:00pm
This lab is worth 10 points.

Now that you have selected your topics for the research project, this lab will help you find research to include in your final report. Computer Science is a fast-moving area, so the majority of relevant research will be from conference proceedings and journals rather than books. The two main conference organizing groups are ACM and IEEE.

Both of these organizations have digital libraries online. However, the campus only has a subscription to ACM. Here is the link for the ACM Digital Library. Try entering your research topic into the search bar and see what papers show up. If you already have a paper in mind, you can use the advanced search to pull up papers by author, title and so forth.

Once you have found a paper on your topic, pay special attention to the References and Prior Work sections. This will point you to other papers on the topic. If you notice many papers citing a certain group of papers or books, that is a sign it is something you want to read. If the paper is not published via ACM, you can see if it is available online by doing a web search. If it is not, take the reference to the campus library and see if they can retrieve the article or journal from one of the other CSU or UC campuses.

Lab Write-up

Find three references for your research topic using the ACM Digital Library and/or a web search on your topic. Email me the reference information using the following format:
Conference proceeding:
Author List. Title. In Proceedings of the "Conference Name", Conference Location, Month and Year of Conference, Page Numbers.

Journal proceeding:
Author List. Title. Journal Name, Volume Number, Issue Number, Page Numbers, Month and Year Published.

Book:
Author List. Title. Publisher, Year Published.
Examples of each reference style:
S. Jha, O. Sheyner, and J. Wing. Two Formal Analyses of Attack Graphs. In
Proceedings of the IEEE Computer Security Foundations Workshop, Cape Brenton, 
Nova Scotia, Canada, June 2002, pp 49-63.

C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi. A Taxonomy of Computer
Program Security Flaws. ACM Computing Surveys, vol. 26, no. 3, pp 211-254,
September 1994.

E. Friedman-Hill. JESS in Action. Manning Publications Company, 2003.
This format (or minor variations of this format) is the most commonly used format in Computer Science papers. ACM provides the references in BibTex and EndNote format if you are using either program to manage your references. If you are not using either program, you can still cut and paste the BibTex citation and rearrange it into the above format.