Hardware-based ray casting for tetrahedral meshes

被引:58
|
作者
Weiler, M [1 ]
Kraus, M [1 ]
Merz, M [1 ]
Ertl, T [1 ]
机构
[1] Univ Stuttgart, VIS, D-70569 Stuttgart, Germany
关键词
ray casting; pixel shading; programmable graphics hardware; cell projection; tetrahedral meshes; unstructured meshes; volume visualization; pre-integrated volume rendering;
D O I
10.1109/VISUAL.2003.1250390
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present the first implementation of a volume ray casting algorithm for tetrahedral meshes running on off-the-shelf programmable graphics hardware. Our implementation avoids the memory transfer bottleneck of the graphics bus since the complete mesh data is stored in the local memory of the graphics adapter and all computations, in particular ray traversal and ray integration, are performed by the graphics processing unit. Analogously to other ray casting algorithms, our algorithm does not require an expensive cell sorting. Provided that the graphics adapter offers enough texture memory, our implementation performs comparable to the fastest published volume rendering algorithms for unstructured meshes. Our approach works with cyclic and/or non-convex meshes and supports early ray termination. Accurate ray integration is guaranteed by applying pre-integrated volume rendering. In order to achieve almost interactive modifications of transfer functions, we propose a new method for computing three-dimensional preintegration tables.
引用
收藏
页码:333 / 340
页数:8
相关论文
共 50 条
  • [41] A graph theoretic model for hardware-based firewalls
    Permpoontanalarp, Y
    Rujimethabhas, C
    NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 228 - 233
  • [42] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [43] Hardware-based Hash Functions for Network Applications
    Yamaguchi, Fumito
    Nishi, Hiroaki
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2013,
  • [44] SpecCert: Specifying and Verifying Hardware-Based Security Enforcement
    Letan, Thomas
    Chifflier, Pierre
    Hiet, Guillaume
    Neron, Pierre
    Morin, Benjamin
    FM 2016: FORMAL METHODS, 2016, 9995 : 496 - 512
  • [45] Foundations of Hardware-Based Attested Computation and Application to SGX
    Barbosa, Manuel
    Portela, Bernardo
    Scerri, Guillaume
    Warinschi, Bogdan
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 245 - 260
  • [46] Simplification of tetrahedral meshes
    Trotts, IJ
    Hamann, B
    Joy, KI
    Wiley, DF
    VISUALIZATION '98, PROCEEDINGS, 1998, : 287 - 295
  • [47] Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)
    Sadeghi, Ahmad-Reza
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 199 - 200
  • [48] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [49] Performance improvement of hardware-based packet classification algorithm
    Chen, YC
    Wang, PC
    Lee, CL
    Chan, CT
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 728 - 736
  • [50] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    ATP EDITION, 2012, (03): : 42 - 49