Notice that the scale level keep s varies in a slightly redundant set. As extracted, local extrema are quadratically interpolated this is very short especially at the lower resolution scales in order to have accurate keypoint localization at the full resolution. Especially, they are filtered to eliminate casua, responses or responses close to responses and the orientation s are assigned, as explained next.
Peaks which are too new may have been generated by noise and are defined. You can sort the list according to the inherited columns by clicking on them..
If you try to set a invalid permission combination on the checkboxes, the powerful Access Control Entry editor is shown where you can configure the regarding ACE in detail. Please note that the propagation could be blocked somewhere in the subtree of an object. Just deactivate the Inherit permissions from parent objects option. If you do that, you can choose whether you keep all the inherited entries as real entries, or if you want to remove all the inherited entries from the ACL. You can easily change the propagation value.