نتایج جستجو برای: exposures
تعداد نتایج: 31939 فیلتر نتایج به سال:
The paper presents the algorithm “Probabilistic Inference with Tabling and Answer subsumption” (PITA) for computing the probability of queries from Logic Programs with Annotated Disjunctions. PITA is based on a program transformation techniques that adds an extra argument to every atom. PITA uses tabling for saving intermediate results and answer subsumption for combining different answers for ...
What viable technologies exist to enable the development of so-called desktop virtual reality (desktop-VR) applications? Specifically, which of these are active and capable of helping us to engineer a multi-user, collaborative, virtual environment (CVE)? An examination of the literature and numerous project websites indicates an array of both overlapping and disparate approaches to this problem...
As early as 1927, legislation in the United States governing the packaging of lyeand acidcontaining products mandated that warning labels be placed on these products. In response to the recognition that caustic exposures were more frequent in children, the Federal Hazardous Substances Act and Poison Prevention Packaging Act were passed in 1970; these acts mandated that all caustics with a conce...
The limitation of network resource reduces the awareness capability of CVE system, which becomes the main bottleneck for applications in Internet. In this paper, we study the relationship between the awareness capability of system and network parameters, such as latency, jitter, and data loss rate; also, according to the features and preferences of user awareness, a network-statusbased solution...
We assessed the e ects of network latency and jitter on a cooperative tele-operation task in a collaborative virtual environment. Two remote partners worked together to manipulate shared virtual objects over a network. The task was to minimize the time to transfer a ring through one of four paths with the least number of collisions. The performance of human subjects was measured and analyzed qu...
Introduction: The 3-km thick stack of ice and dust layers at Mars' north pole, known as the North Polar Layered Deposits (NPLD), is considered a record of climate cycles [1]. Exposures of the NPLD within large circumferential troughs provide insight into their structure and depositional history. Meter-scale pits of unknown origin were discovered to exist within the NPLD exposures [2]. These fea...
In order to respond to the increasing demand for collaboration technologies, several Collaborative Virtual Environments have been proposed. However, most of them work independently of other collaboration tools, providing collaboration only inside their own shared virtual world. This work proposes the definition of a collaborative integration environment implementing a general framework for the ...
This paper outlines formal verification in general and then introduces CVE’s equivalence checking tool gatecomp, an equivalence checker developed in the formal verification group at Infineon, Germany. The basic verification tasks are described and the advanced features of the tool are discussed. The application of gatecomp to large industrial examples is reported. This demonstrates the power of...
The paper is concerned with the support of conceptual design activities in collaborative virtual environments. It proposes a new understanding of conceptual design from a social perspective that explains the levels of support that are needed / required for this type of CVEs and presents the development of a particular CVE that supports conceptual design in the area of interior space design. It ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید