A general approach to the analysis of controlled perturbation algorithms (Q654290): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(8 intermediate revisions by 6 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.comgeo.2011.06.001 / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Juan Monterde / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Juan Monterde / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: CGAL / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LEDA / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.comgeo.2011.06.001 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2004412712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: EXACT GEOMETRIC COMPUTATION USING CASCADING / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient perturbations for handling geometric degeneracies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation of simplicity: a technique to cope with degenerate cases in geometric algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2921776 / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONTROLLED PERTURBATION FOR ARRANGEMENTS OF CIRCLES / rank
 
Normal rank
Property / cites work
 
Property / cites work: A perturbation scheme for spherical arrangements with application to molecular modeling / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing correct Delaunay triangulations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms – ESA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5585020 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4702188 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reliable and Efficient Computational Geometry Via Controlled Perturbation / rank
 
Normal rank
Property / cites work
 
Property / cites work: The nature and meaning of perturbations in geometric computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A simple but exact and efficient algorithm for complex root isolation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A geometric consistency theorem for a symbolic perturbation scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards exact geometric computation / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.COMGEO.2011.06.001 / rank
 
Normal rank

Latest revision as of 23:56, 9 December 2024

scientific article
Language Label Description Also known as
English
A general approach to the analysis of controlled perturbation algorithms
scientific article

    Statements

    A general approach to the analysis of controlled perturbation algorithms (English)
    0 references
    0 references
    0 references
    0 references
    28 December 2011
    0 references
    The implementation of a clear geometric algorithm always has to solve the following problem: On the one hand, computing with rounded arithmetic may question the reliability of programs while, on the other hand, computing with exact arithmetic may be too expensive and hence inefficient. One possible solution has been proposed in the recent past years: the implementation of controlled perturbation algorithms which combine the speed of floating-point arithmetic with a protection mechanism that guarantees reliability, nonetheless. In the paper under review the authors present a general methodology for analyzing controlled perturbation algorithms considering the perturbation amount, the arithmetic precision, the range of input values, and the number of input objects. Some examples are studied in detail: the distinctness of points, the 2D-orientation predicate, the orientation test in D-space and the common intersection point of three circles in the plane. The methodology is powerful enough to analyze all geometric predicates that are formulated as signs of polynomials. Nevertheless, in a future work the authors want to extend the analysis from polynomials to rational functions or expressions involving square roots, or to make controlled perturbation applicable not just to sets of points, but to problems whose input has a combinatorial structure.
    0 references
    reliable geometric computing
    0 references
    controlled perturbation
    0 references
    floating-point computation
    0 references
    numerical robustness problems
    0 references
    algorithm
    0 references
    orientation
    0 references
    intersection point of three circles
    0 references
    geometric predicates
    0 references
    0 references
    0 references
    0 references

    Identifiers