Server IP : 103.119.228.120 / Your IP : 18.217.4.250 Web Server : Apache System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64 User : nobody ( 99) PHP Version : 5.6.40 Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/local/ssl/local/ssl/local/ssl/local/ssl/local/ssl/share/doc/cairo-1.15.12/ |
Upload File : |
Here's an effort to document some of the academic work that was referenced during the implementation of cairo. It is presented in the context of operations as they would be performed by either cairo_stroke() or cairo_fill(): Given a Bézier path, approximate it with line segments: The deCasteljau algorithm "Outillages methodes calcul", P de Casteljau, technical report, - Andre Citroen Automobiles SA, Paris, 1959 That technical report might be "hard" to find, but fortunately this algorithm will be described in any reasonable textbook on computational geometry. Two that have been recommended by cairo contributors are: "Computational Geometry, Algorithms and Applications", M. de Berg, M. van Kreveld, M. Overmars, M. Schwarzkopf; Springer-Verlag, ISBN: 3-540-65620-0. "Computational Geometry in C (Second Edition)", Joseph O'Rourke, Cambridge University Press, ISBN 0521640105. Then, if stroking, construct a polygonal representation of the pen approximating a circle (if filling skip three steps): "Good approximation of circles by curvature-continuous Bezier curves", Tor Dokken and Morten Daehlen, Computer Aided Geometric Design 8 (1990) 22-41. Add points to that pen based on the initial/final path faces and take the convex hull: Convex hull algorithm [Again, see your favorite computational geometry textbook. Should cite the name of the algorithm cairo uses here, if it has a name.] Now, "convolve" the "tracing" of the pen with the tracing of the path: "A Kinetic Framework for Computational Geometry", Leonidas J. Guibas, Lyle Ramshaw, and Jorge Stolfi, Proceedings of the 24th IEEE Annual Symposium on Foundations of Computer Science (FOCS), November 1983, 100-111. The result of the convolution is a polygon that must be filled. A fill operations begins here. We use a very conventional Bentley-Ottmann pass for computing the intersections, informed by some hints on robust implementation courtesy of John Hobby: John D. Hobby, Practical Segment Intersection with Finite Precision Output, Computation Geometry Theory and Applications, 13(4), 1999. http://cm.bell-labs.com/who/hobby/93_2-27.pdf Hobby's primary contribution in that paper is his "tolerance square" algorithm for robustness against edges being "bent" due to restricting intersection coordinates to the grid available by finite-precision arithmetic. This is one algorithm we have not implemented yet. We use a data-structure called Skiplists in the our implementation of Bentley-Ottmann: W. Pugh, Skip Lists: a Probabilistic Alternative to Balanced Trees, Communications of the ACM, vol. 33, no. 6, pp.668-676, 1990. http://citeseer.ist.psu.edu/pugh90skip.html The random number generator used in our skip list implementation is a very small generator by Hars and Petruska. The generator is based on an invertable function on Z_{2^32} with full period and is described in Hars L. and Petruska G., ``Pseudorandom Recursions: Small and Fast Pseurodandom Number Generators for Embedded Applications'', Hindawi Publishing Corporation EURASIP Journal on Embedded Systems Volume 2007, Article ID 98417, 13 pages doi:10.1155/2007/98417 http://www.hindawi.com/getarticle.aspx?doi=10.1155/2007/98417&e=cta From the result of the intersection-finding pass, we are currently computing a tessellation of trapezoids, (the exact manner is undergoing some work right now with some important speedup), but we may want to rasterize directly from those edges at some point. Given the set of tessellated trapezoids, we currently execute a straightforward, (and slow), point-sampled rasterization, (and currently with a near-pessimal regular 15x17 grid). We've now computed a mask which gets fed along with the source and destination into cairo's fundamental rendering equation. The most basic form of this equation is: destination = (source IN mask) OP destination with the restriction that no part of the destination outside the current clip region is affected. In this equation, IN refers to the Porter-Duff "in" operation, while OP refers to a any user-selected Porter-Duff operator: T. Porter & T. Duff, Compositing Digital Images Computer Graphics Volume 18, Number 3 July 1984 pp 253-259 http://keithp.com/~keithp/porterduff/p253-porter.pdf