Pii: S0167-8396(02)00090-0
نویسندگان
چکیده
This paper gives an algorithm for computing proper polynomial parametrizations for a particular class of curves. This class is characterized by the existence of a polynomial parametrization and by the absence of affine singularities. The algorithm requires O(n3 logn) field operations, where n is the degree of the curve. 2002 Elsevier Science B.V. All rights reserved.
منابع مشابه
Pii: S0167-8396(02)00164-4
We study the relationship of transformations between Legendre and Bernstein basis. Using the relationship, we present a simple and efficient method for optimal multiple degree reductions of Bézier curves with respect to the L2-norm. 2002 Elsevier Science B.V. All rights reserved.
متن کاملPET and fMRI studies of the neural basis of speech perception
Functional imaging (PET and fMRI) has made great advances in our understanding of the neural basis of auditory processing and speech perception. Here we review perceptual and sensory processing aspects of speech and hearing, as revealed by functional imaging studies. A comparison is made of the peaks of activity in the left hemisphere across the different studies discussed, with implications fo...
متن کاملRefinement operators for triangle meshes
Refinement operators for triangular meshes as used in subdivision schemes or remeshing are discussed. A numbering scheme is presented, covering all refinement operators that (topologically) map vertices onto vertices. Using this characterization, some special properties of n-adic and √ 3-subdivision are easy to see.
متن کاملCopyleft - the economics of Linux and other open source software
A large population of programmers develops freely distributed software. A novel licensing scheme – copyleft – creates an incentive structure based on complementary income. We build a model in which the occupational choices of programmers determine the qualities of programs in the consumer market. A monopolist, supplying the consumer market, has to take into account the impact the free software ...
متن کاملCoordinating processes with secure spaces
The Linda shared space model and its derivatives provide great flexibility for building parallel and distributed applications composed of independent processes. However, the shared space model does not provide protection against untrustworthy processes. Linda processes communicate by reading and writing messages in a globally visible data space, so a malicious process can launch any number of s...
متن کامل