Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hon Fung Li is active.

Publication


Featured researches published by Hon Fung Li.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 1992

Shapes recognition using the straight line Hough transform: theory and generalization

Derek Chi-Wai Pao; Hon Fung Li; R. Jayakumar

A shape matching technique based on the straight line Hough transform (SLHT) is presented. In the theta - rho space, the transform can be expressed as the sum of the translation term and the intrinsic term. This formulation allows the translation, rotation, and intrinsic parameters of the curve to be easily decoupled. A shape signature, called the scalable translation invariant rotation-to-shifting (STIRS) signature, is obtained from the theta - rho space by computing the distances between pairs of points having the same theta value. This signature is invariant to translation and can be easily normalized, and rotation in the image space corresponds to circular shifting of the signature. Matching two signatures only amounts to computing a 1D correlation. The height and location of a peak (if it exists) indicate the similarity and orientation of the test object with respect to the reference object. The location of the test object is obtained, once the orientation is known, by an inverse transform (voting) from the theta - rho space to the x-y plane. >


Information Processing Letters | 1987

Optimal checkpointing and local recording for domino-free rollback recovery

K. Venkatesh; Thiruvengadam Radhakrishnan; Hon Fung Li

Abstract Backward error recovery or rollback recovery is a well-known technique used in the design of reliable uni-processor computer systems. However, use of this technique for design of reliable distributed computer systems could result in uncontrolled rollback which is known as the domino effect. Here, we formally present the reasons for the domino effect by specifically identifying the unmatched receives (backward dependency) and unmatched sends (retransmission dependency) that occur during reexecution as the sole causes. A technique is developed which selectively stores the received messages in order to account for the backward dependencies and which coordinates the checkpoints to eliminate the retransmission dependencies, thus achieving domino-free rollback. Rollback is confined only to the interacting processes by dependency tracking of the messages. Further, we present a scheme for identifying and purging possibly contaminated messages during recovery. Our scheme is compared with some of the existing schemes and its significant advantages are highlighted.


Pattern Recognition | 1989

Improvements and systolic implementation of the Hough transformation for straight line detection

Hon Fung Li; Derek Chi-Wai Pao; R. Jayakumar

Abstract Hough Transformation (HT) is an efficient method to detect straight lines in digital pictures. In the conventional HT, pixel contiguity is not taken into account, and this leads to the following drawbacks: (1) actual length of line segments cannot be computed; (2) colinear line segments cannot be distinguished; and (3) very often, false lines are detected and short lines go undetected. This paper proposes a modified Hough Transformation which performs contiguity check in a simple and efficient way. A systolic architecture that implements this modified transform is presented. The systolic array takes the bit-map of the binary picture as input and processes one row/column of pixels concurrently. The area-time complexity of the proposed architecture is shown to be superior to the conventional sequential algorithm. Preliminary simulation results are presented.


computer aided verification | 1990

Using Partial-Order Semantics to Avoid the State Explosion Problem in Asynchronous Systems

David K. Probst; Hon Fung Li

We avoid state explosion in model checking of delay-insensitive VLSI systems by not using states. Systems are networks of communicating finite-state nonsequential processes with well-behaved nondeterministic choice. A specification strategy based on partial orders allows precise description of the branching and recurrence structure of processes. Process behaviors are modelled by pomsets, but (discrete) sets of pomsets with implicit branching structure are replaced by pomtrees, which have finite presentations by (automaton-like) behavior machines. The latter distinguish both concurrency and branching points, and define a finite recurrence structure. Safety and liveness checking are integrated. In contrast to state methods, our methods do not require enumeration or recording of states. We avoid separate consideration of execution sequences that do not differ in their partial order, and ensure termination by recording only a small number of system loop cutpoints — in the form of system behavior states. In spite of the name, behavior states are not states.


IEEE Transactions on Computers | 1989

A study of two approaches for reconfiguring fault-tolerant systolic arrays

Clement W. H. Lam; Hon Fung Li; R. Jayakumar

Presents a critical study of two approaches, the classical RC-cut approach and H.T. Kung and M.S. Lams (Proc. 1984 MIT Conf. Advanced Res. VLSI p.74-83, 1984) RCS-cut approach, for reconfiguring faulty systolic arrays. The amount of cell (processing element) redundancy needed to ensure successful reconfiguration into an n*n array is considered. It is shown that no polynomial bounded redundancy is sufficient for the classical approach, whereas O(n/sup 2/log n) redundancy is sufficient for the Kung and Lams approach. The number of faulty cells that can be tolerated in a given array regardless of their locations is characterized and derived. It is shown that, for both approaches, in almost all cases a square array has better fault tolerance than a rectangular array having the same number of cells. A minimal fault pattern in a 2n*2n array with 3n+1 faults that is not reconfigurable into an n*n array using either of the two approaches is established. >


Pattern Recognition Letters | 1993

A decomposable parameter space for the detection of ellipses

Derek Chi-Wai Pao; Hon Fung Li; R. Jayakumar

Abstract Hough transform is a well-known method for detecting parametric curves in binary images. One major drawback of the method is that the transform requires time and memory space exponential in the number of parameters of the curves. An effective approach to reduce both the time and space requirement is the parameter space decomposition. In this paper, we present two methods for the detection of ellipses based on the straight line Hough transform (SLHT). The SLHT of a curve in the θ-π space can be expressed as the sum of two terms, namely, the translation term , and the intrinsic term . One useful property of this representation is that it allows the translation, rotation and intrinsic parametersof the curve be separated easily. Timing performance of the proposed methods compares favorably with the other Hough-based methods.


automated software engineering | 2004

Granularity-Driven Dynamic Predicate Slicing Algorithms for Message Passing Systems

Hon Fung Li; Juergen Rilling; Dhrubajyoti Goswami

Program Slicing is a well-known decomposition technique that transforms a large program into a smaller one that contains only statements relevant to the computation of a selected function. In this paper, we present two novel predicate-based dynamic slicing algorithms for message passing programs. Unlike more traditional slicing criteria that focus only on parts of the program that influence a variable of interest at a specific position in the program, a predicate focuses on those parts of the program that influence the predicate. The dynamic predicate slices capture some global requirements or suspected error properties of a distributed program and computes all statements that are relevant. The presented algorithms differ from each other in their computational approaches (forward versus backward) and in the granularity of information they provide. A proof of correctness of these algorithms is provided. Through the introduction of dominant states and dominant events, critical statement executions are identified that change the value of the global predicate. Under this formulation, optimizing dynamic predicate slicing becomes a meaningful goal as well. Finally, we present how predicate slices can be applied to support comprehension tasks for analyzing and maintaining distributed programs.


computer aided verification | 1991

Partial-Order Model Checking: A Guide for the Perplexed

David K. Probst; Hon Fung Li

Practicing verifiers of finite-state concurrent systems should be able to adapt our partial-order methods for verifying delay-insensitive systems to other verification problems. We answer the question, is it possible to control state explosion arising from various sources during automatic verification (model checking) of delay-insensitive systems? State explosion due to concurrency is handled by introducing a partial-order representation for processes, and defining system correctness as a simple relation between two partial orders on the same set of system events. State explosion due to nondeterminism is handled when the system to be verified has a compact, finite recurrence structure. Backwards branching through representations is a further optimization. In system verification, we start with models of system components that explicitly distinguish concurrency, choice and recurrence structure; during model checking, this a priori structure of components allows us to construct a compact, finite representation of the specification-constrained implementation — without prior composition of system components. The fully-implemented POM verification system has polynomial space and time performance on traditional asynchronous-circuit benchmarks that are exponential in space and time for other verification systems; in general, the cost of running our verification algorithm is proportional to the size of the constructed system representation.


international conference on data engineering | 1988

Scheduling of page fetches in join operations using B/sub c/-trees

Pankaj Goyal; Hon Fung Li; Eric Regener; Fereidoon Sadri

The authors consider B/sub c/-trees in a centralized system with large main memory, and show that in some cases the join operation using B/sub c/-trees out performs other join techniques. The results can be used for estimating the cost of join using B/sub c/-trees and then making a decision regarding the most efficient join technique to be used.<<ETX>>


IEEE Transactions on Computers | 1988

Abstract specification of synchronous data types for VLSI and proving the correctness of systolic network implementations

David K. Probst; Hon Fung Li

A combined methodology is presented for specifying abstract synchronous data types and proving the correctness of systolic network implementations. It is shown that an extension of the Parnas trace method of specifying software modules containing distinct access programs yields a natural method of specifying abstract synchronous data types that possess distinct access operators and are intended for implementation in VLSI. Associated systematic proof techniques are presented, and the correctness of several novel systolic network implementations of familiar data types is established. The methodology appears to be naturally suited to systolic network implementations with their associated rippling of control flow and data flow. The important distinction between systolic control-flow networks and systolic data-flow networks is presented. >

Collaboration


Dive into the Hon Fung Li's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Derek Chi-Wai Pao

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ajit Singh

University of Waterloo

View shared research outputs
Researchain Logo
Decentralizing Knowledge