نتایج جستجو برای: primitive tools

تعداد نتایج: 301981  

2013
Kulwant Singh Nitin Sharma

This work focuses on integrated design computation and proposes methodologies and tools to build border designs integrating CAD-CAM technologies. Border patterns are recognized as intervallic and repetitive arrangement of a type of motifs. Further, motif is observed as polar array of a primitive which is a tiny geometric object required for the representation of motif. The designs of different ...

Journal: :IBM Journal of Research and Development 1980
Michael A. Wesley Tomás Lozano-Pérez Lawrence I. Lieberman Mark A. Lavin David D. Grossman

Very high level languages for describing mechanical assembly require a representation of the geometric and physical properties of 3 0 objects including parts, tools, and the assembler itself. This paper describes a geometric modeling system that generates a data base in which objects and assemblies are represented by nodes in a graph structure. The edges of the graph represent relationships amo...

2006
Martin Bolt

Typically the track network data model is maintained as an afterthought or with primitive tools or complex procedures. A software tool set to manage unified set functions needed to manage a track network is a sizable, complex and costly endeavor and thus difficult to justify. Bentley Systems, a developer of engineering systems software, has had the opportunity of combining work in the highway a...

Journal: :Networks 2001
Charles J. Colbourn Peng-Jun Wan

SONET/WDM networks using wavelength add–drop multiplexing can be constructed using certain graph decompositions used to form a “grooming,” consisting of unions of certain primitive rings. The existence of such decompositions when every pair of sites employs no more than 8 of the wavelength capacity is determined, with few possible exceptions, when the ring size is a multiple of four. The techni...

Journal: :Cold Spring Harbor perspectives in biology 2012
Robert O Stephenson Janet Rossant Patrick P L Tam

The formation of the three lineages of the mouse blastocyst provides a powerful model system to study interactions among cell behavior, cell signaling, and lineage development. Hippo signaling differences between the inner and outer cells of the early cleavage stages, combined with establishment of a stably polarized outer epithelium, lead to the establishment of the inner cell mass and the tro...

2012
Bob Coyne Alex Klapheke Masoud Rouhizadeh Richard Sproat Daniel Bauer

Text-to-scene conversion requires knowledge about how actions and locations are expressed in language and realized in the world. To provide this knowlege, we are creating a lexical resource (VigNet) that extends FrameNet by creating a set of intermediate frames (vignettes) that bridge between the high-level semantics of FrameNet frames and a new set of low-level primitive graphical frames. Vign...

2015
Nicolas Bacquey

This thesis analyses the computational capabilities of cellular au-tomata working on periodical con gurations of any dimension. We rst studythe maximal objects these cellular automata can identify ; we call those objectsprimitive roots of periodical con gurations of any dimension. We characterizethem and show some of their properties.Secondly, we present a set of algorithms ...

2008
Margus Niitsoo

One of the main tools of cryptography are reductions. The simplest way to prove the security of a complex scheme based on the security of its constituents is to prove that if there exists an adversary that breaks the complex scheme then we can construct an adversary that breaks at least one of the constituent primitives. Since the security of the primitive is taken as a premise, this gives a co...

2003
Micah Beck Ying Ding Erika Fuentes Sharmila Kancherl

An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastructure. The exposed approach relies on the client to build higher-level services, with more abstract semantics, out of such primitive tools using sophisticated compilation or run-time algorithms. Current approaches to re...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید