Aggressive region-based visibility computation using importance sampling

Tan Chi Ho*, Ying I. Chiu, Wen-Chieh Lin, Jung-Hong Chuang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We present an aggressive region-based visibility sampling algorithm for general 3D scenes. The visibility portal in the scene is a cue for guiding the visibility sampling. Our algorithm extends the image space sampling algorithm by measuring the size and orientation of portals in the scene, and results in a predictable sampling mechanism of visible set in the image space. An importance visibility sampling scheme in the image space is proposed based on the visibility portals, and used to guide the sampling process. Each newly added visibility sample is placed at the position potentially visible for most missing polygons. Experiments show that our sampling approach can effectively improve the performance of visibility sampling in both the convergence rate and the visual quality compared to the previous approaches.

Original languageEnglish
Title of host publicationProceedings - VRCAI 2012
Subtitle of host publication11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry
Pages119-125
Number of pages7
DOIs
StatePublished - 1 Dec 2012
Event11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012 - Singapore, Singapore
Duration: 2 Dec 20124 Dec 2012

Publication series

NameProceedings - VRCAI 2012: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry

Conference

Conference11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012
CountrySingapore
CitySingapore
Period2/12/124/12/12

Keywords

  • occlusion culling
  • visibility

Fingerprint Dive into the research topics of 'Aggressive region-based visibility computation using importance sampling'. Together they form a unique fingerprint.

Cite this