This paper proposes a generic design for 3D model retrieval. It has been developed in cooperation with EADS, which deals with computer Aided Design / computer Aided engineering (below CAD/CAE) data through the product...
详细信息
This paper proposes a generic design for 3D model retrieval. It has been developed in cooperation with EADS, which deals with computer Aided Design / computer Aided engineering (below CAD/CAE) data through the product life cycle. Sharing these models with users across the enterprise is a challenging task. CAD/CAE models may be hundreds of megabytes large and stored in proprietary formats. Browsing and previewing this data efficiently requires new tools. One way to leverage the collaboration in and outside of CAD domains is to offer through a repository an access to a neutral 3D data format. Also functionalities for semantic enrichment of 3D models, for the retrieval of context sensitive information and for 3D model retrieval based on 3D similarity search and CBIR techniques should be provided.
In networked control systems (NCS), it is considered essential to design a robust controller such that the networked-system is stable against data dropouts during the network transfer. It has been shown that there is ...
In networked control systems (NCS), it is considered essential to design a robust controller such that the networked-system is stable against data dropouts during the network transfer. It has been shown that there is a critical data dropout rate over which the networked-system could be unstable; hence the desired task cannot be achieved. This paper shows that a desired task or trajectories can be still achieved even though there are feedback signal dropouts if the desired task is repetitive, as in the iterative learning control case. Specifically this paper shows how to design stochastic iterative learning control systems such that the networked-system with a repetitive task is robust stable against measurement and process noises and independent, intermittent output channel dropouts.
Inherent connections are known to exist between common randomness generated by multiterminal source coding and channel coding on the one hand, and information theoretic secrecy generation by means of public communicat...
详细信息
ISBN:
(纸本)9781424429257
Inherent connections are known to exist between common randomness generated by multiterminal source coding and channel coding on the one hand, and information theoretic secrecy generation by means of public communication on the other hand. Based on these connections, points of contact have been found recently also between secrecy generation for a special model for the latter and the combinatorial problem of tree packing in a multigraph. This paper provides a brief (and partial) survey of these links, especially those between secrecy generation and combinatorial tree packing. Our objective is to highlight specific connections between common randomness, secrecy and tree packing.
While much research has been devoted to learning and machine intelligence, the field is still in its infancy. In particular, a technology that will allow for heuristic exploitation of information domain regularities t...
详细信息
Cell manufacturing is widely introduced to cope with the dynamically changing market demands. This study considers a scheduling method for a cell assembly system for the products that are characterized by the type and...
详细信息
Pervasive Augmented Reality Gaming and Mobile P2P are both attracting significant focus and much progress has occurred recently. Augmented reality games extend reality with virtual elements to enhance game experience ...
详细信息
This paper presents a cross-modal approach of image retrieval from a medical image collection which integrates visual information based on purely low-level image contents and case related textual information from the ...
详细信息
Success in the open source software world has been measured in terms of metrics such as number of downloads, number of commits, number of lines of code, number of participants, etc. These metrics tend to discriminate ...
详细信息
The recent emergence of wireless mesh networks as a quick and inexpensive way to access the Internet has gained attention in the networking field. While using multiple radios improves network throughput, it undermines...
详细信息
The approaches for extraction and representation of knowledge from textual user requirements could be summarized in two groups: i) when we have in mind an end model and seek, mine and represent knowledge for it. In sh...
详细信息
ISBN:
(纸本)9781601320254
The approaches for extraction and representation of knowledge from textual user requirements could be summarized in two groups: i) when we have in mind an end model and seek, mine and represent knowledge for it. In short, this approach can be defined as "knowledge driven from a target model";ii) when we have in mind knowledge in a text, and seek an appropriate model to represent it. The intermediate model obtained in this manner can be processed further, to achieve another kind of end model. We define this approach as "model driven from source knowledge". This paper presents an approach of the second kind, for analyzing textual user requirements and extraction and representation of knowledge as a graphical requirement engineering (RE) model - Use Case Paths.
暂无评论