61,442 research outputs found

    Office Technology

    Get PDF

    High-resolution computed tomography reconstructions of invertebrate burrow systems

    Get PDF
    The architecture of biogenic structures can be highly influential in determining species contributions to major soil and sediment processes, but detailed 3-D characterisations are rare and descriptors of form and complexity are lacking. Here we provide replicate high-resolution micro-focus computed tomography (μ-CT) data for the complete burrow systems of three co-occurring, but functionally contrasting, sediment-dwelling inter-tidal invertebrates assembled alone, and in combination, in representative model aquaria. These data (≤2,000 raw image slices aquarium−1, isotropic voxel resolution, 81 μm) provide reference models that can be used for the development of novel structural analysis routines that will be of value within the fields of ecology, pedology, geomorphology, palaeobiology, ichnology and mechanical engineering. We also envisage opportunity for those investigating transport networks, vascular systems, plant rooting systems, neuron connectivity patterns, or those developing image analysis or statistics related to pattern or shape recognition. The dataset will allow investigators to develop or test novel methodology and ideas without the need to generate a complete three-dimensional computation of exemplar architecture

    Top-Down Skiplists

    Full text link
    We describe todolists (top-down skiplists), a variant of skiplists (Pugh 1990) that can execute searches using at most log2εn+O(1)\log_{2-\varepsilon} n + O(1) binary comparisons per search and that have amortized update time O(ε1logn)O(\varepsilon^{-1}\log n). A variant of todolists, called working-todolists, can execute a search for any element xx using log2εw(x)+o(logw(x))\log_{2-\varepsilon} w(x) + o(\log w(x)) binary comparisons and have amortized search time O(ε1logw(w))O(\varepsilon^{-1}\log w(w)). Here, w(x)w(x) is the "working-set number" of xx. No previous data structure is known to achieve a bound better than 4log2w(x)4\log_2 w(x) comparisons. We show through experiments that, if implemented carefully, todolists are comparable to other common dictionary implementations in terms of insertion times and outperform them in terms of search times.Comment: 18 pages, 5 figure

    Crypto-Verifying Protocol Implementations in ML

    Get PDF
    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F# code to CryptoVerif processes, and from CryptoVerif declarations to F# code. We present two case studies: an implementation of the Otway-Rees protocol, and an implementation of a simplified password-based authentication protocol. In both cases, we obtain concrete security guarantees for a computational model closely related to executable code
    corecore