Loki: Software for Computing Cut Loci

نویسندگان

  • Robert Sinclair
  • Minoru Tanaka
چکیده

Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Experimental Evaluation of the Coda

Experimental evaluation is an important way to assess distributed systems, and fault injection is the dominant technique in this area for the evaluation of a system’s dependability. For distributed systems, network failure is an important fault model. Physical network failures often have far-reaching effects, giving rise to multiple correlated failures as seen by higher-level protocols. This th...

متن کامل

Full pedigree quantitative trait locus analysis in commercial pigs using variance components.

In commercial livestock populations, QTL detection methods often use existing half-sib family structures and ignore additional relationships within and between families. We reanalyzed the data from a large QTL confirmation experiment with 10 pig lines and 10 chromosome regions using identity-by-descent (IBD) scores and variance component analyses. The IBD scores were obtained using a Monte Carl...

متن کامل

Cryptanalysis of LOKI

In BPS90] Brown, Pieprzyk and Seberry proposed a new encryp-tion primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI. In this paper we show rst that the keyspace of any LOKI-version is only 2 60 , not 2 64 as claimed. Therefore there are 15 equivalent keys for every key, that encrypts/decrypts texts t...

متن کامل

Hardware Enforcement of Application Security Policies Using Tagged Memory

Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and enforced in an OS kernel, providing a strong assurance of security. This paper shows that enforce...

متن کامل

An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System

Experimental evaluation is an important way to assess distributed systems, and fault injection is the dominant technique in this area for the evaluation of a system’s dependability. For distributed systems, network failure is an important fault model. Physical network failures often have far-reaching effects, giving rise to multiple correlated failures as seen by higher-level protocols. This pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Experimental Mathematics

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2002