delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2012/12/14/17:03:02

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=mail.ud03.udmedia.de; h=
message-id:date:from:mime-version:to:subject:references
:in-reply-to:content-type:content-transfer-encoding; s=beta; bh=
V235v+KRHstVHwMx5qd/ag0L2+s2QAc6wzJ4JEEwuSA=; b=X5p9PNPDOLM9hZYB
HNP3Y9MEnW2qKaF1uRHQoxneurHmABSyybbxyZbCLnoHieS5Gc+drAe8NxSZrmmU
GFoNTy55hyai7QaubUIUx9AfWITo26sRHXFzJ+fPYkcWRSu4kj03qmhetz7tRRXZ
ZbA7DyB/6AD5sWaiJmtDGmVvIX0=
Message-ID: <50CBA1B8.9050706@jump-ing.de>
Date: Fri, 14 Dec 2012 23:01:28 +0100
From: Markus Hitter <mah AT jump-ing DOT de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/17.0 Thunderbird/17.0
MIME-Version: 1.0
To: geda-user AT delorie DOT com
Subject: Re: [geda-user] Find rat lines
References: <20121204183305 DOT 6b04c0dc AT jive DOT levalinux DOT org> <20121208112649 DOT 388a9d22 AT jive DOT levalinux DOT org> <1355011808 DOT 19390 DOT 8 DOT camel AT localhost> <alpine DOT DEB DOT 2 DOT 00 DOT 1212090407031 DOT 26605 AT igor2priv> <1355188647 DOT 12937 DOT 14 DOT camel AT localhost> <A7B4EDBD-3704-4837-9350-A16559C60A2A AT noqsi DOT com> <201212140010 DOT qBE0ABjV023762 AT envy DOT delorie DOT com> <172CCAAB-0423-43EF-8A04-5A9961F1D5B9 AT noqsi DOT com> <201212140122 DOT qBE1MoKM019255 AT envy DOT delorie DOT com> <5AA18F19-2EA9-4E7D-9378-F768D8E1E5DD AT jump-ing DOT de> <alpine DOT DEB DOT 2 DOT 00 DOT 1212140501300 DOT 26605 AT igor2priv> <50CB5D82 DOT 8060507 AT jump-ing DOT de> <E5DE4486-B23F-4945-943A-F46C6E308B90 AT noqsi DOT com>
In-Reply-To: <E5DE4486-B23F-4945-943A-F46C6E308B90@noqsi.com>
Reply-To: geda-user AT delorie DOT com

Am 14.12.2012 19:03, schrieb John Doty:
>
> On Dec 14, 2012, at 10:10 AM, Markus Hitter wrote:
>
>> Clearly, requiring manual track tagging isn't helpful.
>
> [...] But attempting to use
> leaky heuristics as a foundation  [...]

A track connected to something is either part of the same net or it 
represents a short. For my part, I don't see where heuristics kicks in, 
much less leaky heuristics.

For completeness, there can be a function to choose a net manually 
everytime, of course. Experts sometimes find funny ways to solve 
unambiguous sitations :-)


Markus

-- 
- - - - - - - - - - - - - - - - - - -
Dipl. Ing. (FH) Markus Hitter
http://www.jump-ing.de/

- Raw text -


  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019