Dear MITK users,

We have improved the AccessByItk macros (used for accessing a MITK image 
by a correctly typed itk::Image template) and the 
InstantiateAccessFunction macros in substantial ways. If you are using 
these macros in your own code, please have a look at the list at the end 
of this mail for possible incompatibilities and how to fix them.

The documentation at 
http://docs.mitk.org/nightly-qt4/group__Adaptor.html has been updated 
correspondingly.

Thanks,
Sascha


- No implicit inclusion of mitkImageCast.h, mitkImageAccessByItk.h, or
mitkInstantiateAccessFunctions.h anymore. If you are using any functions
or macros declared in these headers, you have to explicitly include them
in your source files.

- AccessFixedTypeByItk* macro signature changed. Instead of supplying
one pixel type and one dimension as arguments, this macro now takes a
sequence of pixel types and dimensions. Here is an example:

AccessFixedTypeByItk(mitkImage, MyAccessFunction, short, 2)

must be changed to

AccessFixedTypeByItk(mitkImage, MyAccessFunction, (short), (2))

- The semantics of the InstantiateAccessFunction macros changed. Instead
of explicitly instantiating the template, this macro now uses a user
defined macro to implicitly instantiate templates which can have
arbitrary additional template parameters or arguments. If you have an
access function like:

template<typename TPixel, int VImageDimension>
void MyAccessFunction(itk::Image<TPixel, VImageDimension>  itkImage, int param);

A call to

InstantiateAccessFunction_1(MyAccessFunction, int)

must be changed to

#define InstantiateAccessFunction_MyAccessFunction(TPixel, VImageDimension) \
    template void MyAccessFunction(itk::Image<TPixel, VImageDimension>, int);

InstantiateAccessFunction(MyAccessFunction)

- Similarily to AccessFixedTypeByItk, the
InstantiateAccessFunctionForFixedType macro has a changed signature. It
also takes a sequence of pixel types and dimensions.



------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
mitk-users mailing list
mitk-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mitk-users

Reply via email to