61,442 research outputs found
High-resolution computed tomography reconstructions of invertebrate burrow systems
The architecture of biogenic structures can be highly influential in determining species contributions to major soil and sediment processes, but detailed 3-D characterisations are rare and descriptors of form and complexity are lacking. Here we provide replicate high-resolution micro-focus computed tomography (μ-CT) data for the complete burrow systems of three co-occurring, but functionally contrasting, sediment-dwelling inter-tidal invertebrates assembled alone, and in combination, in representative model aquaria. These data (≤2,000 raw image slices aquarium−1, isotropic voxel resolution, 81 μm) provide reference models that can be used for the development of novel structural analysis routines that will be of value within the fields of ecology, pedology, geomorphology, palaeobiology, ichnology and mechanical engineering. We also envisage opportunity for those investigating transport networks, vascular systems, plant rooting systems, neuron connectivity patterns, or those developing image analysis or statistics related to pattern or shape recognition. The dataset will allow investigators to develop or test novel methodology and ideas without the need to generate a complete three-dimensional computation of exemplar architecture
Top-Down Skiplists
We describe todolists (top-down skiplists), a variant of skiplists (Pugh
1990) that can execute searches using at most
binary comparisons per search and that have amortized update time
. A variant of todolists, called working-todolists,
can execute a search for any element using binary comparisons and have amortized search time
. Here, is the "working-set number" of
. No previous data structure is known to achieve a bound better than
comparisons. We show through experiments that, if implemented
carefully, todolists are comparable to other common dictionary implementations
in terms of insertion times and outperform them in terms of search times.Comment: 18 pages, 5 figure
Crypto-Verifying Protocol Implementations in ML
We intend to narrow the gap between concrete
implementations and verified models of cryptographic protocols.
We consider protocols implemented in F#, a variant of ML, and
verified using CryptoVerif, Blanchet's protocol verifier for
computational cryptography.
We experiment with compilers from F# code to CryptoVerif processes,
and from CryptoVerif declarations to F# code.
We present two case studies: an implementation of the Otway-Rees
protocol, and an implementation of a simplified password-based
authentication protocol. In both cases, we obtain concrete security
guarantees for a computational model closely related to
executable code
- …