dessin de triangulations algorithmes combinatoire et
play

Dessin de triangulations: algorithmes, combinatoire, et analyse - PowerPoint PPT Presentation

Dessin de triangulations: algorithmes, combinatoire, et analyse Eric Fusy Projet ALGO, INRIA Rocquencourt et LIX, Ecole Polytechnique p.1/53 Motivations Display of large structures on a planar surface p.2/53 Planar maps


  1. The red map gives abscissas (1) Let v be an inner vertex of T Let P r ( v ) be the unique path passing by v which is: • the rightmost one before arriving at v • the leftmost one after leaving v P r ( v ) ⇒ v v – p.31/53

  2. The red map gives abscissas (2) The absciss of v is the number of faces of the red map on the left of P r ( v ) A A ⇒ A has absciss 2 – p.32/53

  3. The blue map gives ordinates (1) Similarly we define P b ( v ) the unique blue path which is: • the rightmost one before arriving at v • the leftmost one after leaving v ⇒ P b ( v ) v v – p.33/53

  4. The blue map gives ordinates (2) The ordinate of v is the number of faces of the blue map below P b ( v ) B B ⇒ B has ordinate 4 – p.34/53

  5. Execution of the algorithm – p.35/53

  6. Execution of the algorithm Let f r be the number of faces of the red map f r = 8 – p.35/53

  7. Execution of the algorithm Let f b be the number of faces of the blue map f r = 8 f b = 7 – p.35/53

  8. Execution of the algorithm Take a regular grid of width f r and height f b and place the 4 border vertices of T at the 4 corners of the grid – p.35/53

  9. Execution of the algorithm Place all other points using the red path for absciss and the blue path for ordinate – p.35/53

  10. Execution of the algorithm Place all other points using the red path for absciss and the blue path for ordinate 4 faces on the left – p.35/53

  11. Execution of the algorithm Place all other points using the red path for absciss and the blue path for ordinate 3 faces below – p.35/53

  12. Execution of the algorithm Place all other points using the red path for absciss and the blue path for ordinate – p.35/53

  13. Execution of the algorithm Link each pair of adjacent vertices by a segment – p.35/53

  14. Execution of the algorithm – p.35/53

  15. Results • The obtained drawing is a straight line embedding • The drawing respects the transversal structure: • Red edges are oriented from bottom-left to top-right • Blue edges are oriented from top-left to bottom-right • If T has n vertices, the width W and height H verify W + H = n − 1 similar grid size as He (1996) and Miura et al (2001) – p.36/53

  16. Compaction step • Some abscissas and ordinates are not used • The deletion of these unused coordinates keeps the drawing planar unused unused – p.37/53

  17. Compaction step • Some abscissas and ordinates are not used • The deletion of these unused coordinates keeps the drawing planar unused – p.37/53

  18. Compaction step • Some abscissas and ordinates are not used • The deletion of these unused coordinates keeps the drawing planar – p.37/53

  19. Size of the grid after deletion • If the transversal structure is the minimal one, the number of deleted coordinates can be analyzed: • After deletion, the grid has size 11 27 n × 11 27 n “almost surely” • Reduction of 5 27 ≈ 18% compared to He and Miura et al – p.38/53

  20. Bijection between triangulations and ternary trees – p.39/53

  21. Ternary trees A ternary tree is a plane tree with: • Vertices of degree 4 called inner nodes • Vertices of degree 1 called leaves • An edge connected two inner nodes is called inner edge • An edge incident to a leaf is called a stem A ternary tree can be endowed with a transversal structure – p.40/53

  22. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  23. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  24. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  25. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  26. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  27. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  28. From a ternary tree to a triangulation Local operations to“close”triangular faces – p.41/53

  29. From a ternary tree to a triangulation Draw a quadrangle outside of the figure – p.41/53

  30. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  31. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  32. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  33. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  34. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  35. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  36. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  37. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  38. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  39. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  40. From a ternary tree to a triangulation Merge remaining stems to form triangles – p.41/53

  41. Properties of the closure-mapping • The closure mapping is a bijection between ternary trees with n inner nodes and triangulations with n inner vertices. • The closure transports the transversal structure • The obtained transversal structure on T is minimal left alternating ... ... 4−cycle – p.42/53

  42. Observation to find the inverse mappin The original 4 incident edges of each inner vertex of T remain the clockwise-most edge in each bunch ... Tree – p.43/53

  43. Recover the tree Compute the minimal transversal structure – p.44/53

  44. Recover the tree – p.44/53

  45. Recover the tree Remove quadrangle – p.44/53

  46. Recover the tree – p.44/53

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend