Dear MITK users, We have improved the AccessByItk macros (used for accessing a MITK image by a correctly typed itk::Image template) and the InstantiateAccessFunction macros in substantial ways. If you are using these macros in your own code, please have a look at the list at the end of this mail for possible incompatibilities and how to fix them.
The documentation at http://docs.mitk.org/nightly-qt4/group__Adaptor.html has been updated correspondingly. Thanks, Sascha - No implicit inclusion of mitkImageCast.h, mitkImageAccessByItk.h, or mitkInstantiateAccessFunctions.h anymore. If you are using any functions or macros declared in these headers, you have to explicitly include them in your source files. - AccessFixedTypeByItk* macro signature changed. Instead of supplying one pixel type and one dimension as arguments, this macro now takes a sequence of pixel types and dimensions. Here is an example: AccessFixedTypeByItk(mitkImage, MyAccessFunction, short, 2) must be changed to AccessFixedTypeByItk(mitkImage, MyAccessFunction, (short), (2)) - The semantics of the InstantiateAccessFunction macros changed. Instead of explicitly instantiating the template, this macro now uses a user defined macro to implicitly instantiate templates which can have arbitrary additional template parameters or arguments. If you have an access function like: template<typename TPixel, int VImageDimension> void MyAccessFunction(itk::Image<TPixel, VImageDimension> itkImage, int param); A call to InstantiateAccessFunction_1(MyAccessFunction, int) must be changed to #define InstantiateAccessFunction_MyAccessFunction(TPixel, VImageDimension) \ template void MyAccessFunction(itk::Image<TPixel, VImageDimension>, int); InstantiateAccessFunction(MyAccessFunction) - Similarily to AccessFixedTypeByItk, the InstantiateAccessFunctionForFixedType macro has a changed signature. It also takes a sequence of pixel types and dimensions. ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ mitk-users mailing list mitk-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/mitk-users