Skip to main content

Create bibliographies using bibtex


The file that we are editing is called 'myfile.tex'. To make a bibliography, we should put all our references into a file called 'myfile.bib'. The structure of foo.bib is as follows:

    @BOOK{,
        AUTHOR = "author",
        TITLE = "book title",
        PUBLISHER = {publishing company},
        ADDRESS = {where published},
        YEAR = year published}

For our sample document, we will use the following:

@ARTICLE{ref:bbbar,
AUTHOR    = {O.~Bama et. al.},
TITLE     = {Measurement of the Mass Difference Between Top and Antitop Using 30.6 fb-1 of Run IIb Data.},
JOURNAL   = {\dzero~Note},
VOLUME    = {\textbf{8888}},
YEAR      = {2013}
}


Now you refer to the article in myfile.tex in the following manner:

\cite[p. 22] {ref:bbbar}

This will match the citation number with the number of the article in the list of references.

If you have a few references that you did not explicitely cite in the text of your document, but you would like to include it in the list of references, you use the following (in foo.tex):

    \nocite {ref:ccbar,ref:ddbar,ref:uubar}
where ref:ccbar,ref:ddbar,ref:uubar are abbreviations for the other texts.

To create the bibliography, you need to use the following commands in myfile.tex (usually at the end of the document - where the References section to appear):

    \bibliography{myfile}
    \bibliographystyle{plain}

There are several options for \bibliographystyle:

plain    normal style - listed in ABC order and labeled numerically
unsrt    same as plain except entries appear in order of citation
alpha    same as plain except entry labels are used
abbrv    same as plain except uses abbreviations for first names,    month names, and journal names

Now that you have the basis for a bibliography, you have to run both latex and bibtex on the document. First, you should run latex (to create a myfile.aux file, which bibtex reads). Then run bibtex once to get some of the citations and create a myfile.bbl file. Then run latex again so that the cross references between the text file and the bibliography are correct. You may want to repeat running bibtex and latex on the file to make sure that all cross references are correct. Be warned that adding/deleting citations and sources will require running bibtex again.



Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...