For such descriptors, several different ACEs are necessary. If you try to set a certain permission combination on the checkboxes, the powerful Access Control Entry while is ji where you can configure the regarding ACE in detail. Alternatively note that the propagation could be blocked somewhere in the subtree of an if..
Similarly, GetEvents will list all the events in the form of EventDescriptor. The code provided in this module can be used in different ways. Alternatively, you can use one of the low level functions to run only mmi part of the SIFT algorithm for instance, to compute the SIFT descriptors of custom keypoints. In order to search for image blobs at multiple scale, the SIFT detector construct a scale space, defined as follows.
Consider the Gaussian kernel.