delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2012/12/14/18:08:40

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
Mime-Version: 1.0 (Apple Message framework v1085)
Subject: Re: [geda-user] Find rat lines
From: John Doty <jpd AT noqsi DOT com>
In-Reply-To: <50CBA1B8.9050706@jump-ing.de>
Date: Fri, 14 Dec 2012 16:06:52 -0700
Message-Id: <E796F1EA-BD3E-4EC9-A852-CFE8D156CA62@noqsi.com>
References: <20121204183305 DOT 6b04c0dc AT jive DOT levalinux DOT org> <20121208112649 DOT 388a9d22 AT jive DOT levalinux DOT org> <1355011808 DOT 19390 DOT 8 DOT camel AT localhost> <alpine DOT DEB DOT 2 DOT 00 DOT 1212090407031 DOT 26605 AT igor2priv> <1355188647 DOT 12937 DOT 14 DOT camel AT localhost> <A7B4EDBD-3704-4837-9350-A16559C60A2A AT noqsi DOT com> <201212140010 DOT qBE0ABjV023762 AT envy DOT delorie DOT com> <172CCAAB-0423-43EF-8A04-5A9961F1D5B9 AT noqsi DOT com> <201212140122 DOT qBE1MoKM019255 AT envy DOT delorie DOT com> <5AA18F19-2EA9-4E7D-9378-F768D8E1E5DD AT jump-ing DOT de> <alpine DOT DEB DOT 2 DOT 00 DOT 1212140501300 DOT 26605 AT igor2priv> <50CB5D82 DOT 8060507 AT jump-ing DOT de> <E5DE4486-B23F-4945-943A-F46C6E308B90 AT noqsi DOT com> <50CBA1B8 DOT 9050706 AT jump-ing DOT de>
To: geda-user AT delorie DOT com
X-Mailer: Apple Mail (2.1085)
X-MIME-Autoconverted: from quoted-printable to 8bit by delorie.com id qBEN6v9H012022
Reply-To: geda-user AT delorie DOT com
Errors-To: nobody AT delorie DOT com
X-Mailing-List: geda-user AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

On Dec 14, 2012, at 3:01 PM, Markus Hitter wrote:

> Am 14.12.2012 19:03, schrieb John Doty:
>> 
>> On Dec 14, 2012, at 10:10 AM, Markus Hitter wrote:
>> 
>>> Clearly, requiring manual track tagging isn't helpful.
>> 
>> [...] But attempting to use
>> leaky heuristics as a foundation  [...]
> 
> A track connected to something is either part of the same net or it represents a short.

A track made of copper is a special case of "conductive object", but any conductive object may suffer from a short. The object itself generally does not represent a short: shorts occur at contact points between objects.

> For my part, I don't see where heuristics kicks in, much less leaky heuristics.

DJ has complained that the "first touch" heuristic for identifying connectivity is seriously leaky in complicated cases.

John Doty              Noqsi Aerospace, Ltd.
http://www.noqsi.com/
jpd AT noqsi DOT com



- Raw text -


  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019