Approximate Star-Shaped Decomposition of Point Set Data

Size: px
Start display at page:

Download "Approximate Star-Shaped Decomposition of Point Set Data"

Transcription

1 Eurograhics Symosium on Point-Based Grahics (2007) M. Botsch, R. Pajarola (Editors) Aroimate Star-Shaed Decomosition of Point Set Data Jyh-Ming Lien George Mason University, Fairfa, Virginia, USA Abstract Simlification or decomosition is a common strategy to handle large geometric models, which otherwise require ecessive comutation to rocess. Star-shaed decomosition artitions a model into a set of star-shaed comonents. A model is star shaed if and only if there eists at least one oint which can see all the oints of the model. Due to this interesting roerty, decomosing a model into star-shaed comonents can be used for comuting camera locations to guard a given environment (the art-gallery roblem), skeleton etraction, oint data comression, as well as motion lanning. In this aer, we roose a simle method to artition (or cluster) oint set data (PSD) into aroimately star-shaed comonents. Our method can be alied to both 2D and 3D PSD and can be naturally etended to higher dimensional saces. Our method does not require or comute any connectivity information of the inut oints. The roosed method only requires the osition and the outward normals of oints. Our eerimental results show that the size of the final decomosition is close to otimal. Categories and Subject Descritors (according to ACM CCS): I.3.5 [Comuting Methodologies]: Comuter Grahics[Comutational Geometry and Object Modeling] 1. Introduction Larger and more comle models can be catured chealy nowadays using laser range scanners or stereo cameras. Large geometric models require a lot of comutation resources to rocess. Even with current CPU and GPU advances, simlification is usually required in order to handle such models efficiently. Decomosition is a kind of simlification that artitions a model into simler-shaed and smaller-sized comonents. Star-shaed decomosition artitions a model into a set of star-shaed comonents. A model is star shaed if and only if there eists at least one oint which can see all the oints of the model. Due to this interesting roerty, decomosing a model into star-shaed comonents has many alications. For eamle, star-shaed decomosition can be used to etract shae descritors, e.g., a skeleton. Star-shaed decomosition has been used to comute roadmas and find aths in robotic motion lanning [VM05]. Star-shaed decomosition is also closely related to the art-gallery roblem (see [Chv75]): Finding the fewest cameras to guard a given environment. jmlien@gmu.edu In this aer, we roose a simle method to artition (or cluster) a oint set into aroimately star-shaed comonents. This work rovides an alternative aroach to the eisting star-shaed decomosition methods that are mostly focused on decomosing 2D shaes with continuous boundaries. Our work is insired by more and more techniques roosed to work directly on oint set data (PSD) instead of on reconstructed meshes, e.g., rendering [RL00,ABCO 03], comression, feature etraction [PKG03], and surface analysis [PG01], mesh offsetting [CWRR06], to name just a few. One of the reasons for the oularity of oint-based methods is that the connectivity of the oints is not always easy to comute. An imortant benefit of working directly on oints is that our method can be alied to both 2D and 3D oint sets and can be naturally etended to higher dimensional saces. Our method does not require or comute any connectivity information of the inut oints. The roosed method only requires the ositions and the outward normals of oints, which can usually be comuted efficiently for data obtained from many sources, such as laser scanner or stereo cameras. Another imortant feature of the roosed method is that, as shown in our eerimental results, our decomosition is close to otimal. In all of our eeriments, the size of the final decomosition is only 1.1 to less than five times larger than the otimal size.

2 We begin our discussion by reviewing some of the related work in Section 2. In Section 3, we define the terms and roerties that we will use throughout the aer. The main algorithm of our decomosition method is resented in Sections 4 to 6. Finally, we show eerimental results of the roosed algorithm in Section 7. q s V q s V (P) 2. Related Work Star-Shaed Decomosition. There is little known about 3D star-shaed decomosition. On the contrary, decomosing simle olygons into 2D star-shaed subolygons is well studied; see a survey in [Kei00]. Similar to most of the decomosition roblems, decomosing a olygon with holes into minimum number of star-shaed comonents is NPcomlete [Kei83]. For olygons without holes, the artitioning can be done in O(nlogn) time [AT81] or O(n) [Gho83] time and result in 3 n comonents. Finally, Keil [Kei85] achieved the otimal solution for star-shaed artition with the minimum number criterion in O(n 5 r 2 logn) time, where r is the number of the refle vertices. Star-shaed decomosition is related to guarding an art gallery [Chv75]. A olygon is said to be guarded if it is covered by the visible regions of the guards. The visible region of a guard is a star-shaed comonent. The roblem of finding minimum guards is known to be NP-comlete for olygons with or without holes [OS83, LL86]. Aroimate aroaches also have high comleities, e.g., O(n 5 logn) time [Gho87] and O(n 4 logn) time [AGS88]. In 3D, aroimate aroaches have been roosed to guard terrain (see [BMKM05]). Decomosition of Points. Several methods have been roosed to decomose oint set data into meaningful comonents, e.g., by Dey et al. [DGG03]. Recently, Yamazaki et al. [YNBH06] roosed a decomosition method based on the estimation the centrality of each oint using aroimated geodesic distance. Desite their romising results, one major drawback of this aroach is that the comutation for the centrality is time consuming and requires large memory consumtion. Further simlification of the model and aroimation of the centrality are required to rovide reasonable comutation time. Aroimated Decomosition. The main idea of aroimated decomosition is to take advantage of ignoring detailed features of the model to efficiently roduce smaller decomositions than the eact aroach. Aroimate conve decomosition (ACD) of olygons [LA06] and of olyhedra [LA07] are methods that decomose a model into nearly conve comonents. Lien and Amato have shown that ACD can be generated more efficiently and has more alications than eact conve decomosition methods. As we will show, the aroimate star-shaed decomosition has similar benefits. (a) Figure 1: (a) A olygon. (b) A oint set reresenting the same shae. See Section 3 for detail. 3. Preliminaries: Visibility Before going into details about our decomosition method of oints, let us first review some simle geometric roerties about shae. A shae S is usually reresented by its boundary S and the boundary of a shae is usually reresented by a set of connected oints, i.e., edges and facets. Eamles include 2D olygons and 3D olyhedra. Several geometric roerties can be easily comuted using boundary reresentations. For eamle, given two oints and q, we can check if can directly see q (with resect to S) by checking if the line segment q connecting and q interests the boundary S. That is we can define the visibility of two oints as follows. Definition 3.1. Visibility. Let and q be two oints and let S be a shae. Points and q are visible from each other if and only if q S, where q is the oen set of q. Now, given a oint inside a shae S, we call a set of oints that are visible from the visible region V of (see Figure 1(a)). Definition 3.2. Visible region. Let S be a oint of S. The visible region, denoted as V, of is a set of oints in S that are visible from, i.e., V = {q S q S }. It is easy to see that the visible region V of is a star shae, in which the oint is visible from all the oints of V. Therefore, we can now simly define a star shae and star-shaed decomosition using the concet of visible region. Definition 3.3. Star shae and star-shaed decomosition Shae S is a star shae if and only if there eists a oint S so that V S. A star-shaed decomosition of a shae S is a set of star shaes {S i } whose union is S. Note that, so far, our definitions of visibility and star shae deend on a continuous boundary reresentation of the shae, however, this continuous boundary will not be available in a oint-based reresentation. (b) Point-based reresentation. Now let us return our attention back to oint sets. A oint set data is also a tye of boundary reresentation ecet that these oints are not connected into lines or meshes. Without connectivity, the boundary S of a shae S becomes more ambiguous, thus the definitions and roerties mentioned reviously seem to be not valid anymore. For eamle, how can we check if two oints are visible from each other without the elicit rerec The Eurograhics Association 2007.

3 sentation of the boundary? Fortunately, as we will see, these roerties can be aroimated closely without comuting the connectivity of the oints. We let P be a oint set. We assume that the oint set P is a samle of the boundary S of a shae S and each oint of P is associated with an outward normal direction n. First, let s consider the visibility. Let be an arbitrary oint and be a oint of P. We observe that if the viewing line from to and the outward normal of oint in the oosite direction, must be invisible from. In this case, is called a back oint of. Definition 3.4. Back oint. Given a oint and a oint P. The oint is invisible from if the normal of is ointing in the oosite direction of, i.e., n < 0, ecet the discontinuous oints. Note that Definition 3.4 rovides a necessary condition to identify invisible oints of a guard but not a sufficient condition. In order to find (or aroimate) all visible oints, we have to identify the oints that are occluded by the back oints as well. More recisely, we define the ε-view of a guard as follows. Definition 3.5. ε-view. Given a guard, an ε-view from to a oint is reresented as a cone whose ae is, ae angle is ε and base center is. Any back oint of in s ε-view can occlude the view. Then we can immediately define the occluded oints of a guard. Definition 3.6. Occluded oints. A oint is occluded from a guard if and only if there eists a back oint q in s ε-view and q is closer to than is to. An eamle of the the ε-view is shown in Figure 2. This definition of ε-view hels to identity occluded oints and therefore the visible oints. Using the concet of ε-view, we define ε-visibility. Figure 2: An ε-view of a guard towards a oint. If the oint q is a back oint of, the view is occluded and is not visible by. Definition 3.7. ε-visibility. A oint is ε-visible from a oint if is neither a back oint nor an occluded oint of. Then, a set of ε-visible oints is called the ε-visible region of, denoted as ε-v. ɛ Finally, we say that a oint set P is an ε-aroimate star Points on the boundary of a visible region can be further classified into connected comonents. We call the boundary oints of each comonent discontinuous oints. An eamle is the oint s in Figure 1(b). The discontinuous oints must be refle vertices (whose internal angle is larger than 180 ). The number of discontinuous oints is usually relatively small comaring to the the number of the invisible oints. q shae (or simly ε-a ) if there eists a oint whose ε- visible region is P. Then, as before, an ε-a decomosition of P is simly a set of ε-a s whose union is P. Note that the quality of the aroimation of the true visibility deends on the value of ε. The quality degrades when ε is too large or too small. We will discuss how to comute ε from the oint set in Section 6. In the following section, we will assume that ε is given by the user and start to sketch our method for comuting A decomosition. 4. Aroimate Star-Shaed (A ) Decomosition The framework of the A decomosition is rather straightforward. We first select a oint at random from the oint set P that is not visible from any eisting guards. Then we add as a guard and s ε-visible region as an ε-a to the decomosition. The rocess is iterated until all oints in P are ε-visible by at least a guard. We ick this strategy because of its simlicity and because it has been shown to roduce imressive results for olygons [AMP05]. More imortantly, as we will see in our eerimental results in Section 7, this strategy generates only 1.1 to less than 5 times more guards than any otimal solutions do for some common models in comuter grahics (see Table 1). The main challenge of our A decomosition framework is to aroimate the visible region of a guard. Because of its crucial role in this framework, we will send the entire net section addressing this challenge. 5. ε-visible Region of A Guard In this section, we will discuss methods to comute the ε- visible region of a guard. We first roose a basic method in Section 5.1. Then we will imrove of the efficiency and quality of this basic method in Section 5.2 and in Section 5.3, resectively Basic Aroach This basic aroach is comosed of two stes: Radial artitioning and ε-visible oint identification. Radial artitioning. Given a oint set P and a guard, we use to artition P. To do so, we convert the oints of P to a sherical coordinate system centered at. Then, we artition the sherical coordinate system into 2( π ε )2 equallysized buckets. Each bucket reresents an ε-view of. Finally, each oint of P is assigned to a bucket according to its coordinate. In our imlementation, we use an enclosing bo instead of a shere, and we roject P to the boundary of the bo. An eamle of such a artitioning is shown in Figure 3(a). A benefit of using a bo is its simlicity in etending to high dimensional sace. Find visible oints. We identify ε-visible oints from each bucket. That is, for each bucket, we find the closest back oint of (see the shaded bucket in Figure 3(b)). Then all oints in the bucket that are closer than to are

4 (a) (b) Figure 3: (a) A radial artitioning of the oint set P from a guard. Points in P are rojected to the boundary of a bo defined around. (b) For each bucket, the closest invisible oint is found and all oints that are closer than are considered visible. (c) Darker oints are considered as visible oints from, which collectively form an A of. (c) visible by. Figure 3(c) shows all the ε-visible oints from, which collectively form the A of. Algorithm 5.1 outlines this rocess. Algorithm 5.1: A (P,,ε) comment: Point set P and query oint Assign P into 2( π ε )2 buckets {B i } of s radial artitioning for each bucket B i Comute the closest back oint B i to if eists then d do else d + for each { oint r B i if r < d do then V V r A naïve imlementation of Algorithm 5.1 is of O(n) time comleity for a oint set with n oints. The comutation efficiency can be further imroved if a satial data structure is built on P. Details of this idea will be elaborated in Section 5.2. Moreover, since the guard is selected at random, can have oor visibility. In this case, more guards will be needed to guard the entire oint set. Therefore, in order to reduce the number of guards needed to cover the sace, we find a better from. Details of this method will be discussed in Section 5.3. are artitioned evenly at their center into eight oint sets. (In our eeriment we arbitrarily ick k = 16.) Then a minimum bounding bo is constructed for each oint set as a child of the original bo. This rocess iterates until no boes can be slit. Radial artitioning. Similar to the radial artitioning of the entire oint data, we erform a radial artitioning on the bo tree constructed above. The idea is to traverse the bo tree to-down and find a set of boes that can fit into the buckets. Starting with the bounding bo (the root), we check if all of its vertices belong to the same bucket. If so, we assign the bo to the bucket. Otherwise, we oen the bo and erform the same test for each of the eight child boes and reeat until no unfit boes left. Find visible oints. Similar to the basic method, we find the closest back oint in each bucket. To do so, we first sort the boes from near to far and then start to eamine oints in each bo until we find a back oint. Since checking if a bo fits into a bucket takes only constant time and the number of boes is much smaller than the number of oints, artitioning boes is more efficient than artitioning all oints. Using a bo tree, the comleity of comuting an A becomes outut sensitive, i.e., O(k + m), where k is the number of visible vertices and m is the overhead of building the bo tree and sorting the boes in each bucket Imrove A Efficiency: Bo-tree rerocessing We use a bo tree to re-rocess the inut oint set and to imrove the erformance of the A comutation discussed above. A bo tree is similar to an octree ecet that, in the bo tree, each node is always a smallest (ais-aligned) bounding bo of the enclosed oints. Intuitively, our lan is to lace oints near a guard in smaller boes and lace far away oints in larger boes. With this data structure, we hoe we can find the closest back oint in the nearby small boes without checking the far away large boes. Bo tree construction. The construction of the bo tree starts with the minimum bounding bo of the entire oint set. If there are more than k oints in a bo, these oints 5.3. Imrove A Quality: A Eansion Our goal here is to find a better guard than the randomly selected guard. Here, better means larger visible region. Our strategy is to comute the kernel of the visible oints of a guard and find a guard from the kernel. We define a kernel of a oint set as the following. Definition 5.1. A kernel of a set oints P is another set of oints K. Every oint of K can see all the oints of P. The kernel K of a set of oints V can be comuted as the intersection of half-saces defined by the oints in V (see Figure 4). The key to comute the kernel efficiently is that we can convert these half-saces to the oints V in the

5 K V Figure 4: K is the kernel of the oints V. K is simly the intersection of the half saces (shown as the lines and arrows in the figure) defined by the oints (shown as dark oints in the figure) and oint normals. dual sace, where V is defined as the following: V = { nq q V }. q n q Then the boundary oints in the kernel K are simly dual to the facets of the conve hull of V, which can be comuted efficiently in O(nlogn), where n is the number of oints in V. Lemma 5.2. Let H i = { ( i ) n i < 0} be a half sace defined by a oint i V. The kernel K of V is i H i. Proof. We know that if a oint i V is visible from a oint, the view direction i and the normal of i oint in the same direction. For to be a member of the kernel K, this criterion must hold for all oints of V, i.e., i n i > 0 = ( i ) n i < 0, i, i.e., i H i. Once the kernel is known, we comute a visible region for each verte in the kernel. Since the visible regions of the vertices of the kernel are larger than or equal to V (P) (see Lemma 5.3), our visible region must eand monotonically. This rocess is reeated until no eansion can be gained. The subroutine A -EXPAND is defined in Algorithm 5.2. Algorithm 5.2: A -EXPAND(,V ) Comute the kernel K from V Find k K so that k has the largest visible region V k if V k > V then return (A -EXPAND(k,V k )) else return (,V ) Lemma 5.3. Given a oint and its visible oints V, Algorithm 5.2 must return a guard whose visible region is no smaller than V. Proof. Let K be the kernel of V and let K. Because can see all the oints in V, V V. Therefore V V. It is clear that the time comleity of comuting A - EXPAND is higher than comuting A. One ass of A - EXPAND without the recursive call takes O(n 2 + nlogn) time. In the worst case, only one more oint becomes visible by alying one ass of A -EXPAND. When this haens, the recursion deth is O(n) and the total time comleity for A -EXPAND is O(n 3 ), which is not ractical for most roblems that we are interested in in this work. To reduce the time comleity, we modify Algorithm 5.2 so that only log K oints randomly selected from the kernel K are considered and the recursion stos when the imrovement is less than P /c oints, where c is a user-defined constant. This heuristic is outlined in Algorithm 5.3. Algorithm 5.3: A -EXPAND2(,V ) Comute the kernel K from V Let K contain log K random vertices from K Find k K so that k has the largest visible region V k if V k > V + P c then return (A -EXPAND2(k,V k )) else return (k,v k ) The time comleity of Algorithm 5.3 now becomes O(nlogn). Eerimentally we observe that A -EXPAND and A -EXPAND2 roduce similar results while A -EXPAND2 is much more efficient. For the rest of this aer, A -EXPAND2 is used (if not said otherwise) to comute the A of a given oint. 6. Putting It All Together Algorithm 6.1 shows a fleshed-out version of the A decomosition. Note that in the last ste of Algorithm 6.1 we simle assign each oint to its closest visible guard to roduce the final decomosition. Figure 5 shows an eamle of the A decomositions of a 3-d oint cloud. Algorithm 6.1 has O(knlogn) time comleity, where n and k are the number of oints in P and guards, resectively. Algorithm 6.1: A -DECOMP(P) build a bo tree from P reeat randomly select a oint P invisible by any guards build ε-v of using the bo tree (g,ε-v g) =A -EXPAND2(,ε-V ) add (g,ε-v g) to the decomosition until every oint in P is visible Assigneveryointtoitsclosestvisibleguard Now, the remaining task is to find the value of ε from a given oint set. As we mentioned before, the value of ε has great influence on the quality of the final decomosition. A small ε makes invisible oints visible while a large ε eliminates many visible oints. Our goal is to find the smallest ε that will not classify invisible oints as visible.

6 eternal medial ais q r Figure 6: There must be a samle, such as the oint, in the first intersection of s ε-view and the olygon to ensure that q will not become a visible oint of. Figure 5: A decomositions of the oint data of a horse model (with A -EXPAND2). Each of the 17 large dots in the figure reresents a guard. (This figure is much informative in color. Please refer to the PDF file if you have a black and white rintout.) 6.1. The value of ε The value of ε deends on how dense the oint set P is samled from the boundary of a shae S and the eternal medial ais of S. Lemma 6.1 uses the samling density to comute the value of ε. Lemma 6.1. When ε = ma i {2 arctan( 4γ δ i )}, where δ is the samling density of P and γ i is the distance from a oint i P to its closest oint on the medial ais, Algorithm 6.1 will never classify invisible oints as visible oints. Proof. We show this statement is true by assuming that ε is known and show that if no invisible oint is missed by Algorithm 6.1, then the samling density is 4γ i tan( 2 ε ). Figure 6 shows an eamle of the worst scenario, in which the guard is laced on the boundary of the shae. In addition, s ε-view is aligned with its outward normal and the first segment of the shae blocking the view is erendicular to the view. This make the intersection of the view and the segment shortest. To make Algorithm 6.1 recognize this boundary, there must be a oint samled from the intersection, e.g., the oint in Figure 6. Otherwise, will see through this boundary and classy some invisible oints as visible, e.g., the oint q. Therefore the length of the intersection of the ε-view and the invisible boundary defines the samling density δ. It s easy to see that the length of the intersection is 4γ tan( 2 ε ), where γ is the distance between the eternal medial ais and. Thus, we conclude that if ε = 2 arctan( 4γ δ ) all back oints will be found and no invisible oints are visible by. Both samling density δ and distance to the medial ais γ i can be estimated from the oint set. To estimate, δ, we comute the maimum of the longest distances between each oint and its k nearest neighbors. (We simly set k = 4.) We estimate γ i as the half of the distance between the oint i and its closest back oint. 7. Eerimental Results We imlemented the roosed method in C++. In this section, we show eerimental results from our imlementation using seven common models, which are converted to oint set data and shown in Table 1. We show the the number of guards and comutational efficiency of the roosed methods. We also comare to the estimated lower bound of guards for each oint set. The size of A decomosition is close to the lower bound. We comute the lower bound as the maimum number of guards such that no oints can see more than one guard. Under this definition, we know that no visible regions of any guards can overla and therefore this lower bound must be smaller than the minimum number of guards covering the entire oint set. The estimated lower bound for each oint set is shown in Table 1. Table 1 also shows the averaged number of guards generated by A decomosition over 10 runs. For the cubes, horse, bunny, venus and armadillo models, A decomosition generates just 1.1 to 2.7 times more guards than the lower bound does. Moreover, when the shae of the model is relatively fat (e.g., the cubes, the bunny and the venus models), A decomosition generates only 1.1 to 1.5 times more comaring to the lower bound. On the other hand, A decomosition generates 2.7 times and 4.9 times more guards than the lower bound of the head bone and the david models. The main reason for this is because the lower bound estimation is not accurate enough. This haens when the model has teeth -like or ocket-like regions, e.g., the teeth of the bone model and the ockets around the hair area of the david model. A guard laced at the based of the teeth will rohibit any guards being laced inside the teeth. Figure 7 illustrates this scenario. A eansions reduce decomosition size. Recall that, in Section 5.3, we roosed two A eansions (denoted as full and limited eansions). A eansion is designed to imrove the visibility of a randomly selected guard and to

7 Table 1: Models used in the eeriments. A decomositions of the models are generated with limited eansion. (cubes) (bunny) (venus) (armadillo) (head bone) (david) oint set cubes horse bunny venus armadillo head bone david (above) (Fig. 5) (above) (above) (above) (above) (above) oint size number of A -DECOMP (avg.) guards lower bound Figure 7: In the lower bound estimation, the guard will rohibit us from adding more guards, while the minimum number of guards to cover the environment is seven. Time (sec) no e full e limited e reduce the size of the final decomosition. Figure 8 shows the comutation time and the number of guards. For the limited eansion, we sto eanding when the eansion is not larger than 0.1% of the inut oint size. As you can see from Figure 8, the number of guards generated without any eansion is significantly (2 to 5 times) larger than that with eansions. Moreover, the difference between the guard sizes of the full and the limited eansions is negligible while the limited eansion is always (1.3 to 3 times) faster than the full eansion. Bo tree hels imroving efficiency. The bo tree described in Section 5.2 significantly imroves the efficiency. Figure 9 shows that the imrovement is larger than 100%. Partial coverage. When artial visibility coverage is tolerable, A decomosition can be comuted much more efficiently. In fact, according to Figure 10, if only 90% coverage is needed the number of guards and the comutation time can be halved. Both the size of guards and the comutation time grow eonentially as the coverage ercentage increases. 8. Conclusions In this aer, we roosed a method to decomose a oint set into a set of aroimately star-shaed (A ) comonents. We roosed a method to comute ε-visibility, where ε can be estimated from the inut oint set. Several strategies are investigated to imrove the quality and the efficiency of the A decomosition, namely the bo tree and A eansion. Our eeriments demonstrated these imrovements using seven common models. guards no e full e limited e lower bound cubes horse bunny venus armadillo head bone david Figure 8: Comutation time and guard size with three different A eansions. Each record shows an average of 10 eeriments. Notice that the Y-ais is in logarithmic scale. without bo tree with bo tree Time (sec) 3500 Figure 9: Decomosition time of all seven models with and without bo trees. The major limitation of the roosed method is its efficiency. The comutation can take u to several minutes (4.6 and 3.9 minutes are needed for the bone and the david models, resectively). Fortunately, due to the oularity of the recent multi-core rocessors, we can address this issue by

8 Time (sec) guards david armadillo horse david armadillo horse Covering % Covering % Figure 10: Comutation time and number of guards needed for different ercentages of coverage. Three models are shown in this eeriments. Similar behaviors are observed for all three models. Notice that the Y-ais is in logarithmic scale. arallelizing the roosed method. This can be done by asking rocessors to work on different buckets indeendently. References [ABCO 03] ALEXA M., BEHR J., COHEN-OR D., FLEISHMAN S., LEVIN D., SILVA C. T.: Comuting and rendering oint set surfaces. IEEE Transactions on Visualization and Comuter Grahics 9, 1 (2003), [AGS88] AGGARWAL A., GHOSH S. K., SHYAMASUNDAR R. K.: Comutational comleity of restricted olygon decomositions. In Comutational Morhology, Toussaint G. T., (Ed.). North-Holland, Amsterdam, Netherlands, 1988, [AMP05] AMIT Y., MITCHELL J., PACKER E.: On guarding and artitioning olygons. In 15th Annual Fall Worksho on Comutational Geometry and Visualization (2005). [AT81] AVIS D., TOUSSAINT G. T.: An efficient algorithm for decomosing a olygon into star-shaed olygons. Pattern Recogn. 13 (1981), [BMKM05] BEN-MOSHE B., KATZ M. J., MITCHELL J. S. B.: A constant-factor aroimation algorithm for otimal terrain guarding. In SODA 05: Proceedings of the siteenth annual ACM-SIAM symosium on Discrete algorithms (Philadelhia, PA, USA, 2005), Society for Industrial and Alied Mathematics, [Chv75] CHVÁTAL V.: A combinatorial theorem in lane geometry. J. Combin. Theory Ser. B 18 (1975), [CWRR06] CHEN Y., WANG H., ROSEN D. W., ROSSIGNAC J.: A oint-based offsetting method of olygonal meshes, ASME Journal of Comuting and Information Science in Engineering, in review. [DGG03] DEY T. K., GIESEN J., GOSWAMI S.: Shae segmentation and matching with flow discretization. In Proc. Worksho on Algorithms and Data Structures (2003), [Gho83] GHOSH S. K.: A linear time algorithm for decomosing a monotone olygon into star-shaed olygons. In Proc. 3rd Conf. Found. Softw. Tech. Theoret. Comut. Sci. (1983), [Gho87] GHOSH S. K.: Aroimation algorithms for art gallery roblems. In Proc. Canadian Inform. Process. Soc. Congress (1987), [Kei83] KEIL J. M.: Decomosing Polygons into Simler Comonents. PhD thesis, Det. Comut. Sci., Univ. Toronto, Toronto, ON, [Kei85] KEIL J. M.: Decomosing a olygon into simler comonents. SIAM J. Comut. 14 (1985), [Kei00] KEIL J. M.: Polygon decomosition. In Handbook of Comutational Geometry, Sack J.-R., Urrutia J., (Eds.). Elsevier Science Publishers B.V. North-Holland, Amsterdam, 2000, [LA06] LIEN J.-M., AMATO N. M.: Aroimate conve decomosition of olygons. Comut. Geom. Theory Al. 35, 1 (2006), [LA07] LIEN J.-M., AMATO N. M.: Aroimate conve decomosition of olyhedra. In SPM 07: Proceedings of the 2007 ACM symosium on Solid and hysical modeling (New York, NY, USA, 2007), ACM Press, [LL86] LEE D., LIN A.: Comutational comleity of art gallery roblems. IEEE Trans. Inform. Theory 32, 2 (1986), [OS83] O ROURKE J., SUPOWIT K. J.: Some NP-hard olygon decomosition roblems. IEEE Trans. Inform. Theory IT-30 (1983), [PG01] PAULY M., GROSS M.: Sectral rocessing of ointsamled geometry. In SIGGRAPH 01: Proceedings of the 28th annual conference on Comuter grahics and interactive techniques (New York, NY, USA, 2001), ACM Press, [PKG03] PAULY M., KEISER R., GROSS M.: Multi-scale feature etraction on oint-samled surfaces. In Proceedings of the Eurograhics/ACM SIGGRAPH symosium on Geometry rocessing (2003), [RL00] RUSINKIEWICZ S., LEVOY M.: Qslat: a multiresolution oint rendering system for large meshes. In SIGGRAPH 00: Proceedings of the 27th annual conference on Comuter grahics and interactive techniques (New York, NY, USA, 2000), ACM Press/Addison-Wesley Publishing Co., [VM05] VARADHAN G., MANOCHA D.: Star-shaed roadmas - a deterministic samling aroach for comlete motion lanning. In Robotics Science & Systems (2005). [YNBH06] YAMAZAKI I., NATARAJAN V., BAI Z., HAMANN B.: Segmenting oint sets. In IEEE Intl. Conf. Shae Modeling and Alications (SMI) (2006),

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Cross products Line segments The convex combination of two distinct points p

Cross products Line segments The convex combination of two distinct points p CHAPTER Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

The Spatial Skyline Queries

The Spatial Skyline Queries Coffee sho The Satial Skyline Queries Mehdi Sharifzadeh and Cyrus Shahabi VLDB 006 Presented by Ali Khodaei Coffee sho Three friends Coffee sho Three friends Don t choose this lace is closer to each three

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Global Illumination with Photon Map Compensation

Global Illumination with Photon Map Compensation Institut für Comutergrahik und Algorithmen Technische Universität Wien Karlslatz 13/186/2 A-1040 Wien AUSTRIA Tel: +43 (1) 58801-18688 Fax: +43 (1) 58801-18698 Institute of Comuter Grahics and Algorithms

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

COT5405: GEOMETRIC ALGORITHMS

COT5405: GEOMETRIC ALGORITHMS COT5405: GEOMETRIC ALGORITHMS Objects: Points in, Segments, Lines, Circles, Triangles Polygons, Polyhedra R n Alications Vision, Grahics, Visualizations, Databases, Data mining, Networks, GIS Scientific

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

An Approximation Algorithm For Point Guard Problem

An Approximation Algorithm For Point Guard Problem Australian Journal of Basic and Applied Sciences, 5(9): 1038-1044, 2011 ISSN 1991-8178 An Approximation Algorithm For Point Guard Problem 1 Mohammad Hosseinzadeh Moghaddam, 2 Alireza Bagheri 1 Islamic

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

A Simple and Robust Approach to Computation of Meshes Intersection

A Simple and Robust Approach to Computation of Meshes Intersection A Simle and Robust Aroach to Comutation of Meshes Intersection Věra Skorkovská 1, Ivana Kolingerová 1 and Bedrich Benes 2 1 Deartment of Comuter Science and Engineering, University of West Bohemia, Univerzitní

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Perception of Shape from Shading

Perception of Shape from Shading 1 Percetion of Shae from Shading Continuous image brightness variation due to shae variations is called shading Our ercetion of shae deends on shading Circular region on left is erceived as a flat disk

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

CS 428: Fall Introduction to. Geometric Transformations. Andrew Nealen, Rutgers, /15/2010 1

CS 428: Fall Introduction to. Geometric Transformations. Andrew Nealen, Rutgers, /15/2010 1 CS 428: Fall 21 Introduction to Comuter Grahics Geometric Transformations Andrew Nealen, Rutgers, 21 9/15/21 1 Toic overview Image formation and OenGL (last week) Modeling the image formation rocess OenGL

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

Building Polygonal Maps from Laser Range Data

Building Polygonal Maps from Laser Range Data ECAI Int. Cognitive Robotics Worksho, Valencia, Sain, August 2004 Building Polygonal Mas from Laser Range Data Longin Jan Latecki and Rolf Lakaemer and Xinyu Sun and Diedrich Wolter Abstract. This aer

More information

Curve Reconstruction taken from [1]

Curve Reconstruction taken from [1] Notes by Tamal K. Dey, OSU 47 Curve Reconstruction taken from [1] The simlest class of manifolds that ose nontrivial reconstruction roblems are curves in the lane. We will describe two algorithms for curve

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

3D RECONSTRUCTION OF ROADS AND TREES FOR CITY MODELLING

3D RECONSTRUCTION OF ROADS AND TREES FOR CITY MODELLING 3D RECONSTRUCTION OF ROADS AND TREES FOR CITY MODELLING George Vosselman Deartment of Geodesy, Delft University of Technology, Thijsseweg 11, NL-2629 JA Delft, The Netherlands g.vosselman@geo.tudelft.nl

More information

Generating Social Network Features for Link-based Classification

Generating Social Network Features for Link-based Classification Generating Social Network Features for Link-based Classification Jun Karamon 1, Yutaka Matsuo 2, Hikaru Yamamoto 3, and Mitsuru Ishizuka 1 1 The University of Tokyo, 7-3-1 Hongo Bunkyo-ku Tokyo, Jaan,

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

An Exact and Fast Computation of Discrete Fourier Transform for Polar and Spherical Grid

An Exact and Fast Computation of Discrete Fourier Transform for Polar and Spherical Grid An Eact and Fast Comutation of Discrete Fourier Transform for Polar and Sherical Grid Syed Alam Abbas, Student Member, IEEE, Qiyu Sun, Member, IEEE, and Hassan Foroosh, Senior Member, IEEE Abstract Numerous

More information

Efficient Algorithms for Computing Conservative Portal Visibility Information

Efficient Algorithms for Computing Conservative Portal Visibility Information EUROGRAPHICS 2000 / M. Gross and F.R.A. Hogood (Guest Editors) Volum9 (2000), Number 3 Efficient Algorithms for Comuting Conservative Portal Visibility Information W. F. H. Jiménez, C. Eserança and A.

More information

Thickness computation of trimmed B-Rep model using GPU ray tracing

Thickness computation of trimmed B-Rep model using GPU ray tracing Thickness comutation of trimmed B-Re model using GPU ray tracing G. Lemasson 1,2,3, J.C. Iehl 2, F. Zara 1, B. Shariat 1, V. Baudet 3, P. Arthaud 3 1 Université de Lyon, CNRS, Université Lyon 1, LIRIS,

More information

11/2/2010. In the last lecture. Monte-Carlo Ray Tracing : Path Tracing. Today. Shadow ray towards the light at each vertex. Path Tracing : algorithm

11/2/2010. In the last lecture. Monte-Carlo Ray Tracing : Path Tracing. Today. Shadow ray towards the light at each vertex. Path Tracing : algorithm Comuter Grahics Global Illumination: Monte-Carlo Ray Tracing and Photon Maing Lecture 11 In the last lecture We did ray tracing and radiosity Ray tracing is good to render secular objects but cannot handle

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Introduction to Visualization and Computer Graphics

Introduction to Visualization and Computer Graphics Introduction to Visualization and Comuter Grahics DH2320, Fall 2015 Prof. Dr. Tino Weinkauf Introduction to Visualization and Comuter Grahics Grids and Interolation Next Tuesday No lecture next Tuesday!

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Fundamentals of Restricted-Orientation Convexity

Fundamentals of Restricted-Orientation Convexity Fundamentals of Restricted-Orientation Convexity Eugene Fink Derick Wood Abstract A restricted-orientation convex set, also called an O-convex set, is a set of oints whose intersection with lines from

More information

An Efficient and Highly Accurate Technique for Periodic Planar Scanner Calibration with the Antenna Under Test in Situ

An Efficient and Highly Accurate Technique for Periodic Planar Scanner Calibration with the Antenna Under Test in Situ An Efficient and Highly Accurate echnique for Periodic Planar Scanner Calibration with the Antenna Under est in Situ Scott Pierce I echnologies 1125 Satellite Boulevard, Suite 100 Suwanee, Georgia 30024

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Computing the Visibility Graph of Points Within a Polygon

Computing the Visibility Graph of Points Within a Polygon Comuting the Visibility Grah of Points Within a Polygon Boaz Ben-Moshe Comuter Science Ben-Gurion University Beer-Sheva 84105, Israel benmoshe@cs.bgu.ac.il Olaf Hall-Holt Alied Math. & Statistics Stony

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

level 0 level 1 level 2 level 3

level 0 level 1 level 2 level 3 Communication-Ecient Deterministic Parallel Algorithms for Planar Point Location and 2d Voronoi Diagram? Mohamadou Diallo 1, Afonso Ferreira 2 and Andrew Rau-Chalin 3 1 LIMOS, IFMA, Camus des C zeaux,

More information

Denoising of Laser Scanning Data using Wavelet

Denoising of Laser Scanning Data using Wavelet 27 Denoising of Laser Scanning Data using Wavelet Jašek, P. and Štroner, M. Czech Technical University in Prague, Faculty of Civil Engineering, Deartment of Secial Geodesy, Thákurova 7, 16629 Praha 6,

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Real Time Compression of Triangle Mesh Connectivity

Real Time Compression of Triangle Mesh Connectivity Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity

More information

Range Searching. Data structure for a set of objects (points, rectangles, polygons) for efficient range queries.

Range Searching. Data structure for a set of objects (points, rectangles, polygons) for efficient range queries. Range Searching Data structure for a set of objects (oints, rectangles, olygons) for efficient range queries. Y Q Deends on tye of objects and queries. Consider basic data structures with broad alicability.

More information

CS2 Algorithms and Data Structures Note 8

CS2 Algorithms and Data Structures Note 8 CS2 Algorithms and Data Structures Note 8 Heasort and Quicksort We will see two more sorting algorithms in this lecture. The first, heasort, is very nice theoretically. It sorts an array with n items in

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, 100083 - awulixin@263.net,

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

DPlace2.0: A Stable and Efficient Analytical Placement Based on Diffusion

DPlace2.0: A Stable and Efficient Analytical Placement Based on Diffusion C- DPlace.: A Stable and Efficient Analytical Placement Based on Diffusion Tao Luo and David Z. Pan Deartment of Electrical and Comuter Engineering The University of Teas at Austin, Austin, TX 787 tluo@ece.uteas.edu,

More information

Pujan Ziaie, Thomas Müller, Mary Ellen Foster, Alois Knoll

Pujan Ziaie, Thomas Müller, Mary Ellen Foster, Alois Knoll Using a Naïve Bayes Classifier based on K-Nearest Neighbors with Distance Weighting for Static Hand- esture Recognition in a Human-Robot Dialog System Puan Ziaie, Thomas Mülle Mary Ellen Foste Alois Knoll

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

Image Formation. 2. Camera Geometry. Focal Length, Field Of View. Pinhole Camera Model. Computer Vision. Zoltan Kato

Image Formation. 2. Camera Geometry. Focal Length, Field Of View. Pinhole Camera Model. Computer Vision. Zoltan Kato Image Formation 2. amera Geometr omuter Vision oltan Kato htt://www.in.u-seged.hu/~kato seged.hu/~kato/ 3D Scene Surace Light (Energ) Source inhole Lens Imaging lane World Otics Sensor Signal amera: Sec

More information

Folded Structures Satisfying Multiple Conditions

Folded Structures Satisfying Multiple Conditions Journal of Information Processing Vol.5 No.4 1 10 (Oct. 017) [DOI: 1197/isjji.5.1] Regular Paer Folded Structures Satisfying Multile Conditions Erik D. Demaine 1,a) Jason S. Ku 1,b) Received: November

More information

An accurate and fast point-to-plane registration technique

An accurate and fast point-to-plane registration technique Pattern Recognition Letters 24 (23) 2967 2976 www.elsevier.com/locate/atrec An accurate and fast oint-to-lane registration technique Soon-Yong Park *, Murali Subbarao Deartment of Electrical and Comuter

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

A Concise Workbook for College Algebra

A Concise Workbook for College Algebra City University of New York (CUNY) CUNY Academic Works Oen Educational Resources Queensborough Community College Summer 6--08 A Concise Workbook for College Algebra Fei Ye Queensborough Community College

More information

Multi-Scale Reconstruction of Implicit Surfaces with Attributes from Large Unorganized Point Sets

Multi-Scale Reconstruction of Implicit Surfaces with Attributes from Large Unorganized Point Sets Multi-Scale Reconstruction of Imlicit Surfaces with Attributes from Large Unorganized Point Sets Ireneusz Tobor LaBRI - CNRS - INRIA Universite Bordeaux tobor@labri.fr Patrick Reuter LaBRI - CNRS - INRIA

More information

FAST TRAJECTORY GENERATION USING BEZIER CURVES

FAST TRAJECTORY GENERATION USING BEZIER CURVES FAST TRAJECTORY GENERATION USING BEZIER CURVES Melissa Fiter 1 1 School of Comuter Science and Software Engineering, The Universit of Western Australia ABSTRACT: Man real world alications require the coeistence

More information