• Articles • Previous Articles     Next Articles

The Differential Equation Algorithm for General Deformed Swept Volumes

WANG Guoping; HUA Xuanji; SUN Jiaguang;   

  1. Department of Computer Science and Technology; Peking University; Beijing 100871; P.R. China; Department of Mathematics; Fadan University; Shanghai 200433; P.R. China; CAD Center Department of Computer Science;….
  • Online:2000-11-10 Published:2000-11-10

The differential equation approach for characterizing swept volume boundaries is extended to include objects experiencing deformation. For deformed swept volume, it is found that the structure and algorithm of sweep-envelope differential equation (SEDE) are similar between the deformed and the rigid swept volumes. The efficiency of SEDE approach for deformed swept volume is proved with an example.

Key words: crosstalk; resource assignment; routing; track reservation; VLSI;

[1] Blackmore D, Leu M C. Analysis of swept volume via Lie groups and differential equations. Int. J.Robots Research, 1992, 11(6): 516-537.

[2] Blackmore D, Leu M C, Wang K K. Application of flows and envelopes to NC machining. Annals of the CIRP, 1992, 41(1): 493-496.

[3] Blackmore D, Jiang H, Leu M C. Modeling of swept solids using sweep differential techniques. In Proc.4th IFIP WG5.2 Workshop, Geometric Modeling in CAD, Renesselaerville, NU, USA, 1992. ……….
[1] Ibrahim S. Alsukayti. Quality of Service Support in RPL Networks: Standing State and Future Prospects [J]. Journal of Computer Science and Technology, 2022, 37(2): 344-368.
[2] Zhong-Dong Qi, Yi-Ci Cai, Qiang Zhou. Design-Rule-Aware Congestion Model with Explicit Modeling of Vias and Local Pin Access Paths [J]. , 2015, 30(3): 614-628.
[3] Ji-Liang Zhang, Gang Qu, Yong-Qiang Lv, and Qiang Zhou. A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs [J]. , 2014, 29(4): 664-678.
[4] Yuan-Yuan Xu, Ce Zhu, and Lu Yu. Multipath Routing of Multiple Description Coded Images in Wireless Networks [J]. , 2014, 29(4): 576-588.
[5] Shi-Ming He, Da-Fang Zhang, Kun Xie, Hong Qiao, and Ji Zhang. Channel Aware Opportunistic Routing in Multi-radio Multi-channel Wireless Mesh Networks [J]. , 2014, 29(3): 487-501.
[6] Pin-Yan Lu (陆品燕), Member, ACM, and Chang-Yuan Yu (余昌远). Worst-Case Nash Equilibria in Restricted Routing [J]. , 2012, 27(4): 710-717.
[7] Manas Ranjan Kabat, Manoj Kumar Patel, and Chita Ranjan Tripathy. A Heuristic Algorithm for Core Selection in Multicast Routing [J]. , 2011, 26(6): 954-961.
[8] Ming-Wen Chen (陈明文), Jian Zhang (张健), Song-Lin Hu (虎嵩林), Senior Member, CCF and Zhi-Yong Liu (刘志勇), Senior Member, CCF. Covering-Based Routing Algorithms for Cyclic Content-Based P/S Overlays [J]. , 2010, 25(6): 1214-1224.
[9] Moonseong Kim, Matt W. Mutka, Member, ACM, Senior Member, IEEE, Jeonghoon Park, and Hyunseung Choo, Member, ACM, IEEE. ROAD+: Route Optimization with Additional Destination-Information and Its Mobility Management in Mobile Networks [J]. , 2010, 25(2): 298-312.
[10] Ying Zhang, Hua-Wei Li, Member, CCF, Senior Member, IEEE, and Xiao-Wei Li, Member, CCF, Senior Member, IEEE. Selected Crosstalk Avoidance Code for Reliable Network-on-Chip [J]. , 2009, 24(6): 1074-1085.
[11] Ming-Jun Xiao, Member, CCF, Liu-Sheng Huang, Senior Member, CCF, Qun-Feng Dong, An Liu, and Zhen-Guo Yang. Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks [J]. , 2009, 24(5): 975-986.
[12] San-Cheng Peng, Student Member, CCF, Wei-Jia Jia, Member, ACM, Senior Member, IEEE, and Guo-Jun Wang, Senior Member, CCF. Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks [J]. , 2009, 24(4): 761-774.
[13] Kevin Chiew and Yingjiu Li. Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics [J]. , 2009, 24(1 ): 175-180 .
[14] Xue Zhang, Jue Hong, Sang-Lu Lu, Li Xie, and Jian-Nong Cao. Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks [J]. , 2008, 23(6 ): 944-956 .
[15] You-Jian Zhao, Zu-Hui Yue, and Jian-Ping Wu. Research on Next-Generation Scalable Routers Implemented with H-Torus Topology [J]. , 2008, 23(4 ): 684-.
Full text



[1] Zhong Renbao; Xing Lin; Ren Zhaoyang;. An Interactive System SDI on Microcomputer[J]. , 1987, 2(1): 64 -71 .
[2] Zhu Mingyuan;. Two Congruent Semantics for Prolog with CUT[J]. , 1990, 5(1): 82 -91 .
[3] Shen Yidong;. Form alizing Incomplete Knowledge in Incomplete Databases[J]. , 1992, 7(4): 295 -304 .
[4] Adelino Santos;. Cooperative Hypermedia Editing with CoMEdiA[J]. , 1993, 8(3): 67 -79 .
[5] Jiang Chanaiun;. Net Operations (Ⅱ)-The Iterated Addition Operation of Petri Nets[J]. , 1995, 10(6): 509 -517 .
[6] Fang Zhiyi; Ju Jiubin;. NONH:A New Cache-Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation[J]. , 1996, 11(4): 405 -415 .
[7] CHEN Haiming;. Function Definition Language FDL andIts Implementation[J]. , 1999, 14(4): 414 -421 .
[8] HE Taosong;. Volumetric Virtual Environments[J]. , 2000, 15(1): 37 -46 .
[9] Wei Lu, Xiu-Tao Yang, Tao Lv, and Xiao-Wei Li. An Efficient Evaluation and Vector Generation Method for Observability-Enhanced Statement Coverage[J]. , 2005, 20(6): 875 -884 .
[10] Zhou-Wang Yang, Chun-Lin Wu, Jian-Song Deng,and Fa-Lai Chen. Specification of Initial Shapes for Dynamic Implicit Curve/Surface Reconstruction[J]. , 2006, 21(2): 249 -254 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved