Loki: Software for Computing Cut Loci
نویسندگان
چکیده
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
منابع مشابه
An Experimental Evaluation of the Coda
Experimental evaluation is an important way to assess distributed systems, and fault injection is the dominant technique in this area for the evaluation of a system’s dependability. For distributed systems, network failure is an important fault model. Physical network failures often have far-reaching effects, giving rise to multiple correlated failures as seen by higher-level protocols. This th...
متن کاملFull pedigree quantitative trait locus analysis in commercial pigs using variance components.
In commercial livestock populations, QTL detection methods often use existing half-sib family structures and ignore additional relationships within and between families. We reanalyzed the data from a large QTL confirmation experiment with 10 pig lines and 10 chromosome regions using identity-by-descent (IBD) scores and variance component analyses. The IBD scores were obtained using a Monte Carl...
متن کاملCryptanalysis of LOKI
In BPS90] Brown, Pieprzyk and Seberry proposed a new encryp-tion primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI. In this paper we show rst that the keyspace of any LOKI-version is only 2 60 , not 2 64 as claimed. Therefore there are 15 equivalent keys for every key, that encrypts/decrypts texts t...
متن کاملHardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and enforced in an OS kernel, providing a strong assurance of security. This paper shows that enforce...
متن کاملAn Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System
Experimental evaluation is an important way to assess distributed systems, and fault injection is the dominant technique in this area for the evaluation of a system’s dependability. For distributed systems, network failure is an important fault model. Physical network failures often have far-reaching effects, giving rise to multiple correlated failures as seen by higher-level protocols. This pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Experimental Mathematics
دوره 11 شماره
صفحات -
تاریخ انتشار 2002