903 resultados para Affine Blocking Sets
The relation of extreme North Atlantic blocking frequencies, cold and dry spells in ERA-40 in winter
Resumo:
In this paper we present a hybrid method to track human motions in real-time. With simplified marker sets and monocular video input, the strength of both marker-based and marker-free motion capturing are utilized: A cumbersome marker calibration is avoided while the robustness of the marker-free tracking is enhanced by referencing the tracked marker positions. An improved inverse kinematics solver is employed for real-time pose estimation. A computer-visionbased approach is applied to refine the pose estimation and reduce the ambiguity of the inverse kinematics solutions. We use this hybrid method to capture typical table tennis upper body movements in a real-time virtual reality application.
Resumo:
Complementary to automatic extraction processes, Virtual Reality technologies provide an adequate framework to integrate human perception in the exploration of large data sets. In such multisensory system, thanks to intuitive interactions, a user can take advantage of all his perceptual abilities in the exploration task. In this context the haptic perception, coupled to visual rendering, has been investigated for the last two decades, with significant achievements. In this paper, we present a survey related to exploitation of the haptic feedback in exploration of large data sets. For each haptic technique introduced, we describe its principles and its effectiveness.
Resumo:
The paper discusses the phenomenon of injunctions against third parties that are innocent from the tort law perspective. One such type of injunction, website blocking, is currently appearing in the spotlight around various European jurisdictions as a consequence of the implementation of Article 8(3) of the Information Society Directive and Article 11 of the Enforcement Directive. Website-blocking injunctions are used in this paper only as a plastic and perhaps also canonical example of the paradigmatic shift we are facing: the shift from tort-law-centric injunctions to in rem injunctions. The author of this paper maintains that the theoretical framework for the latter injunctions is not in the law of civil wrongs, but in an old Roman law concept of ‘in rem actions’ (actio in rem negatoria). Thus the term ‘in rem injunctions’ is coined to describe this paradigm of injunctions. Besides the theoretical foundations, this paper explains how a system of injunctions against innocent third parties fits into the private law regulation of negative externalities of online technology and explores the expected dangers of derailing injunctions from the tracks of tort law. The author’s PhD project – the important question of the justification of an extension of the intellectual property entitlements by the in rem paradigm, along with its limits or other solutions – is left out from the paper.
Resumo:
Internet connectivity providers have been ordered to block access to websites facilitating copyright infringement in various EU countries.In this paper, the proportionality of these enforcement measures is analysed. After addressing preliminary questions, the recent ECJ ruling UPC Telekabel Wien (C-314/12) and then case law from all Member States are examined from the perspective of proportionality. Finally, five criteria are submitted for proportionality analysis, and a proportionality evaluation is provided. The major observation is that the underlying goal of copyright enforcement has implications on how the scale tilts. In particular, ineffective enforcement mechanisms can be more easily accepted if the goal of symbolic, educational or politically motivated enforcement is considered legitimate. On the other hand, if the goal is to decrease the impact of infringement, higher efficiency and economically quantifiable results may be required
Resumo:
This article examines social network users’ legal defences against content removal under the EU and ECHR frameworks, and their implications for the effective exercise of free speech online. A review of the Terms of Use and content moderation policies of two major social network services, Facebook and Twitter, shows that end users are unlikely to have a contractual defence against content removal. Under the EU and ECHR frameworks, they may demand the observance of free speech principles in state-issued blocking orders and their implementation by intermediaries, but cannot invoke this ‘fair balance’ test against the voluntary removal decisions by the social network service. Drawing on practical examples, this article explores the threat to free speech created by this lack of accountability: Firstly, a shift from legislative regulation and formal injunctions to public-private collaborations allows state authorities to influence these ostensibly voluntary policies, thereby circumventing constitutional safeguards. Secondly, even absent state interference, the commercial incentives of social media cannot be guaranteed to coincide with democratic ideals. In light of the blurring of public and private functions in the regulation of social media expression, this article calls for the increased accountability of the social media services towards end users regarding the observance of free speech principles
Resumo:
Here we present a study of the 11 yr sunspot cycle's imprint on the Northern Hemisphere atmospheric circulation, using three recently developed gridded upper-air data sets that extend back to the early twentieth century. We find a robust response of the tropospheric late-wintertime circulation to the sunspot cycle, independent from the data set. This response is particularly significant over Europe, although results show that it is not directly related to a North Atlantic Oscillation (NAO) modulation; instead, it reveals a significant connection to the more meridional Eurasian pattern (EU). The magnitude of mean seasonal temperature changes over the European land areas locally exceeds 1 K in the lower troposphere over a sunspot cycle. We also analyse surface data to address the question whether the solar signal over Europe is temporally stable for a longer 250 yr period. The results increase our confidence in the existence of an influence of the 11 yr cycle on the European climate, but the signal is much weaker in the first half of the period compared to the second half. The last solar minimum (2005 to 2010), which was not included in our analysis, shows anomalies that are consistent with our statistical results for earlier solar minima.
Resumo:
Several methods based on Kriging have recently been proposed for calculating a probability of failure involving costly-to-evaluate functions. A closely related problem is to estimate the set of inputs leading to a response exceeding a given threshold. Now, estimating such a level set—and not solely its volume—and quantifying uncertainties on it are not straightforward. Here we use notions from random set theory to obtain an estimate of the level set, together with a quantification of estimation uncertainty. We give explicit formulae in the Gaussian process set-up and provide a consistency result. We then illustrate how space-filling versus adaptive design strategies may sequentially reduce level set estimation uncertainty.
Resumo:
The first section of this chapter starts with the Buffon problem, which is one of the oldest in stochastic geometry, and then continues with the definition of measures on the space of lines. The second section defines random closed sets and related measurability issues, explains how to characterize distributions of random closed sets by means of capacity functionals and introduces the concept of a selection. Based on this concept, the third section starts with the definition of the expectation and proves its convexifying effect that is related to the Lyapunov theorem for ranges of vector-valued measures. Finally, the strong law of large numbers for Minkowski sums of random sets is proved and the corresponding limit theorem is formulated. The chapter is concluded by a discussion of the union-scheme for random closed sets and a characterization of the corresponding stable laws.
Resumo:
We construct holomorphic families of proper holomorphic embeddings of \mathbb {C}^{k} into \mathbb {C}^{n} (0\textless k\textless n-1), so that for any two different parameters in the family, no holomorphic automorphism of \mathbb {C}^{n} can map the image of the corresponding two embeddings onto each other. As an application to the study of the group of holomorphic automorphisms of \mathbb {C}^{n}, we derive the existence of families of holomorphic \mathbb {C}^{*}-actions on \mathbb {C}^{n} (n\ge5) so that different actions in the family are not conjugate. This result is surprising in view of the long-standing holomorphic linearization problem, which, in particular, asked whether there would be more than one conjugacy class of \mathbb {C}^{*}-actions on \mathbb {C}^{n} (with prescribed linear part at a fixed point).
Resumo:
In this note we survey recent results on automorphisms of affine algebraic varieties, infinitely transitive group actions and flexibility. We present related constructions and examples, and discuss geometric applications and open problems.