# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

7 Pages

### WeiLi_poster

Course: CS 267, Fall 2008
School: Berkeley
Rating:

Word Count: 242

#### Document Preview

Rendering CUDACUDA-based of 3D Minkowski Sums CS267 Project j Wei Li Background and Motivation g Minkowski sum C = A B = {a + b | a A, b B} = 3D Minkowski sum O( 3n3) complexity for concave objects O(m l it f bj t Existing computation algorithms very slow Several minutes for simple objects with hundreds of triangles Motivation Fast visual feedback of Minkowski sum Input as triangulated polyhedra...

Register Now

#### Unformatted Document Excerpt

Coursehero >> California >> Berkeley >> CS 267

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
Rendering CUDACUDA-based of 3D Minkowski Sums CS267 Project j Wei Li Background and Motivation g Minkowski sum C = A B = {a + b | a A, b B} = 3D Mink...
Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Berkeley - CS - 267
Towards a Parallel Implementation of The Growing String MethodStephen ElkindTransition State Finding Algorithms Utilize electronic structure calculations to determine potential energy surface and deduce reaction mechanisms and rates. Transiti
Berkeley - CS - 267
Replica Exchange Molecular Dynamics (REMD) for Amber's Particle-Mesh Ewalds MD (PMEMD) codeLia Ball Teresa Head-Gordon GroupGoal: Converging A monomer Molecular Dynamics simulations Use Amber ff99SB force field and TIP4P-ew explicit water model
Berkeley - CS - 267
Parallel POPCycle Implementation Ben Steffen- Integrative BiologyCS267: Applications of Parallel Computers-Spring 2009Abstract:This project involved implementing a parallel version of POPCYCLE, an individual-based model of the population dynamics
Berkeley - CS - 267
&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt; &lt;Error&gt;&lt;Code&gt;NoSuchKey&lt;/Code&gt;&lt;Message&gt;The specified key does not exist.&lt;/Message&gt;&lt;Key&gt;bcd024ab1e49745216b0f8577569b8dec0de06ea.pptx&lt;/Key&gt;&lt;RequestId&gt; CE8709E7E6121B12&lt;/RequestId&gt;&lt;HostId&gt;jQNQ9r9NQWX6BtcCvNUaurqE0N
Berkeley - CS - 267
FUTURE TECHNOLOGIES GROUPAuto-tuning Memory Intensive Kernels for MulticoreSam WilliamsSWWilliams@lbl.gov1OutlineFUTURE TECHNOLOGIES GROUP1. 2. 3. 4. 5. 6. 7.Challenges arising from Optimizing Single Thread Performance New Challenges Ari
Berkeley - CS - 267
CS 267 Tricks with TreesJames Demmelwww.cs.berkeley.edu/~demmel/cs267_Spr0902/11/2009CS267 Lecture 7+1Outlin e log n lower bound to compute any function in parallel A Reduction and broadcast in O(log n) time Parallel prefix (scan) in O
Santa Clara - COEN - 150
Access Control Mechanisms and Security ModelsHow does the computer enforce access policy?Readings EROS essays on capabilities (instead of accesslists) http:/www.eros-os.org/essays/00Essays.htmlAccess Control: Mechanisms and Models Dual mo
Santa Clara - COEN - 150
Encryptiononly the basicsReading Assignment Why crypto is hard http:/www.counterpane.com/whycrypto.html Encryption wars: earlyhttp:/www.spectrum.ieee.org/pubs/spectrum/0400/enc.html Encryption wars: shifting tacticshttp:/www.spectrum.ieee.
Santa Clara - COEN - 150
Viruses, Worms and other Malicious CodeReadings buffer overflow attack http:/www.insecure.org/stf/smashstack.txt Java Security http:/www.cs.princeton.edu/sip/faq/java-faq.php3 Security 101 (this company is trying to sell you something) http:/www
Santa Clara - COEN - 150
1The Present and Future of Electronic Payment SystemsVivek Reddy vjreddy@scu.edu Coen 150 5/17/042 Abstract. Electronic commerce and electronic business are the inevitable mediums of exchange in an increasingly wired world. To better understand
Santa Clara - COEN - 150
Biometrics: Voice RecognitionJustin Eng Coen150Outline of PresentationIntroduction to voice biometrics The history of voice recognition and its milestones How voice biometric works Benefits and problems that voice recognition encounters Current
Santa Clara - COEN - 150
INFORMATION ASSURANCE PROJECT Firewalls: An Important Component in Computer Systems SecurityProject Prepared for COEN 150 Information Assurance Instructor: Dr. JoAnne Holliday Date of Submission: May 17, 2004by Bao Ming SohTable of ContentsSe
Santa Clara - COEN - 150
FIREWALLSAn Important Component in Computer Systems SecurityBy: Bao Ming Soh What is a Firewall hardware, software, or a combination of both, that isolates an internal network from the Internet. filters information, allowing some pac
Santa Clara - COEN - 150
HIPPA and the GLB: The Information Security and the LawMark Goodell Holliday 5-17-04AbstractThis paper looks at the Gramm-Leach-Bliley Financial Modernization Act (GLB) and the Health Insurance Portability and Accountability Act (HIPPA), passed
Santa Clara - COEN - 150
HIPAA and the GLBConnections Between Congress and Information AssuranceThe Basics HIPAA passed in 1996 Regulation authority by Health and Human Services Privacy rule in effect in 2003 Security rule in effect 2005 GLB passed in 1999 Scope is
Santa Clara - COEN - 150
Biometrics Analysisby Adam Skogrand Evan McLean Mathew EdwardsMay 17, 2004 COEN 150 Information Assurance Dr. HollidayAbstract This paper covers the use of three different biometric authentication technologies and compares the effectiveness of e
Santa Clara - COEN - 150
802.11 Wireless Networking and SecurityCoen 150 Project May 17, 2004 Robert Whitmire Noeau KamakaniChapter 1: What is Wireless Networking? In this technologically advanced era, computer users are finding easier and more efficient ways to connect
Santa Clara - COEN - 150
802.11 Wireless Insecurity By: No'eau Kamakani Robert Whitmire OutlineBackground Security Features Attacks Demonstrations Conclusion Background Wireless Definitions802.11 WiFi 802 = LANs (Local Area Network) 11 = Wir
Santa Clara - COEN - 150
&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt; &lt;Error&gt;&lt;Code&gt;NoSuchKey&lt;/Code&gt;&lt;Message&gt;The specified key does not exist.&lt;/Message&gt;&lt;Key&gt;2873d0609737959d5b71f85662cebf9820b73198.ppt&lt;/Key&gt;&lt;RequestId&gt;E F1901030194FBA9&lt;/RequestId&gt;&lt;HostId&gt;qj6F34ds42e2mV8aTho0/bTnunt
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|28 Apr 2004 18:05:12 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|28 Apr 2004 18:05:12 -0000 vti_filesize:IR|111616 vti_cachedlinkinfo:VX| vti_cachedsvcrellinks:VX| vti_cachedtitle:SR|Design
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|02 Apr 2004 00:26:54 -0000 vti_extenderversion:SR|4.0.2.2717 vti_filesize:IR|305664 vti_title:SR|Topics in Information Security vti_assignedto:SR| vti_approvallevel:SR| vti_backlinkinfo:VX|coen150sp04/c
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 May 2004 20:45:50 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|04 May 2004 20:45:50 -0000 vti_filesize:IR|152064 vti_cachedlinkinfo:VX| vti_cachedsvcrellinks:VX| vti_cachedtitle:SR|Legal
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|28 Apr 2004 18:13:12 -0000 vti_extenderversion:SR|4.0.2.2717 vti_backlinkinfo:VX|coen150sp04/coen150sp04.htm vti_cacheddtm:TX|28 Apr 2004 18:13:12 -0000 vti_filesize:IR|60416 vti_cachedlinkinfo:VX| vti_
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|18 May 2004 14:56:44 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|18 May 2004 14:56:44 -0000 vti_filesize:IR|108544 vti_cachedlinkinfo:VX|H|mailto:Vjreddy@scu.edu vti_cachedsvcrellinks:VX|NH
Santa Clara - COEN - 150
&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt; &lt;Error&gt;&lt;Code&gt;NoSuchKey&lt;/Code&gt;&lt;Message&gt;The specified key does not exist.&lt;/Message&gt;&lt;Key&gt;1b09f066773279d28717cc26af7dabb77dbb50f5.ppt&lt;/Key&gt;&lt;RequestId&gt;9 5270AA23A45EB9B&lt;/RequestId&gt;&lt;HostId&gt;sV22w+C1FKG+CHzK8UdGpxCSK4K
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|21 May 2004 04:18:20 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|21 May 2004 04:18:20 -0000 vti_filesize:IR|121344 vti_cachedlinkinfo:VX| vti_cachedsvcrellinks:VX| vti_cachedtitle:SR|PowerP
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|23 May 2004 15:39:20 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|23 May 2004 15:39:20 -0000 vti_filesize:IR|24576 vti_cachedlinkinfo:VX| vti_cachedsvcrellinks:VX| vti_cachedtitle:SR|Erich C
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|23 May 2004 18:36:36 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|23 May 2004 18:36:36 -0000 vti_filesize:IR|1054208 vti_cachedlinkinfo:VX|H| http:/searchnetworking.techtarget.com/sDefinitio
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|18 May 2004 09:34:42 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|18 May 2004 09:34:42 -0000 vti_filesize:IR|171520 vti_cachedlinkinfo:VX|H|http:/www.siliconvalley.com/mld/siliconvalley/4332
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|19 May 2004 03:05:56 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|19 May 2004 03:05:56 -0000 vti_filesize:IR|648192 vti_cachedlinkinfo:VX| vti_cachedsvcrellinks:VX| vti_cachedtitle:SR|Biomet
Santa Clara - COEN - 150
vti_encoding:SR|utf8-nl vti_timelastmodified:TR|24 May 2004 10:19:06 -0000 vti_extenderversion:SR|4.0.2.2717 vti_cacheddtm:TX|24 May 2004 10:19:06 -0000 vti_filesize:IR|152576 vti_cachedlinkinfo:VX|H|http:/foldoc.doc.ic.ac.uk/foldoc/contents/security
East Los Angeles College - AC - 931
Essex Business School, AC 931AC 931 Portfolio Management Lecture 1George Dotsis Room 5S.7.12 Tel: 01206 874261 Email: gdotsis@essex.a
East Los Angeles College - AC - 931
Lecture 8: Market EfficiencyOutline: Lecture outline: What is market efficiency? How is efficiency tested for? Weak Form Semi-Strong Strong Summary Reading RB Ch 6, CN Ch 3, EG Ch 17, SAB Ch 41Definitions of Market Efficiency Efficient mar
Uni. Worcester - MME - 518
Sonya Kuokkanen Beverly MacLeod Laura Robinson Project 2Contour Lines: IntroductionObjective: By the end of this lesson the students should understand what a contourline is and how to use it.Methodology:1. What is a Contour? Define as a line t
Virginia Tech - CS - 3414
\centerline{\bf Spline (a.k.a. piecewise polynomial) representations.}Consider the case of a piecewise cubic polynomial $g(x)$ withbreakpoints $\xi_1&lt;\xi_2&lt; \cdots&lt;\xi_{n+1}$.\medskip\noindent{\bf (1) Polynomial coefficients} $c_{ji}$, $1\le i\l Virginia Tech - CS - 3414 %!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: nanotes.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -l 2 -o nanotes.ps %+ nanotes.dv Virginia Tech - CS - 3414 \centerline{\bfXII FLOATING POINT ARITHMETIC}\bigskipA (nonzero, normalized) base$\beta$,$t$-digit floating point numberhas the mathematical representation$\pm.d_1d_2\cdots d_t\times\beta^e,$where$m\le e\le M,\qquad 1\le d_1\le\beta-1, \qqua
Virginia Tech - CS - 3414
\centerline{\bf CS/MATH 3414 Lab \# 1}\bigskipIn 250 B. C. E., the Greek mathematician Archimedes estimated thenumber $\pi$ as follows. He looked at a circle with diameter 1, andhence circumference $\pi$. Inside the circle he inscribed a square.
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 5-6 -o %+ cs3414S97.ps cs3
Virginia Tech - CS - 3414
&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt;&lt;Error&gt;&lt;Code&gt;NoSuchKey&lt;/Code&gt;&lt;Message&gt;The specified key does not exist.&lt;/Message&gt;&lt;Key&gt;73973084ee1d5c1661715be08e722b2f407f5560.txt&lt;/Key&gt;&lt;RequestId&gt;D70357A6A7A22F8B&lt;/RequestId&gt;&lt;HostId&gt;pE3r+KsFcTY8NDevndf98W9h4PNE
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 18-19 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 1 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 23-23 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
\centerline{\bf CS/MATH 3414 Lab \# 8}\bigskip\item {(5) 1.}(Problem 4.12, page 156 in Shampine, Allen, and Pruess.) For turbulent flow of fluid in a smooth pipe, the equation$1=\sqrt{c_f}\bigl(-0.4+1.74 \ln(\hbox{Re}\sqrt{c_f})\bigr)$ models th
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 24-25 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 27-28 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 29-30 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 3 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 32-34 -o %+ cs3414S97.ps c
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: num_diff.dvi %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -o num_diff.ps %+ num_diff.dvi
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: nanotes.dvi %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -p 47 -o nanotes.ps %+ nanotes.d
Virginia Tech - CS - 3414
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Title: cs3414S97.dvi %Pages: 3 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: /usr/local/tex3.1415/bin/dvips -pp 1-3 -o %+ cs3414S97.ps cs3
Virginia Tech - CS - 3414
\magnification=1095\parindent=30pt \parskip=4pt plus 4pt minus 4pt %\hsize=5.41in \vsize=7.5in %for magnification=1200 \hsize=5.91in \vsize=8.18in %for magnification=1095\baselineskip=13pt plus 2pt minus 1pt \lineskiplimit=2pt\lineskip=2
Illinois State - ASHARM - 478
Database securityWhen the threat is real and the stakes are high04/27/04Abhilasha Sharma1Outline for the presentation The topic justification Different ways to attack a database Potential threats Security features Oracle 9i IBM DB2 M
Illinois State - ASHARM - 463
Assignment 4 ITK 463Abhilasha Sharma 02/23/04Activity 4 Project/Application Function Point Calculation Worksheet Project A/Problem # 1 May want to use pencil to record your answers. Function Types Internal Logical Files #s Complexity Weights Comp
Syracuse - CSE - 776
AbstractFactoryPatternJimFawcett Su2001IntentProvideaninterfaceforcreatingfamiliesofrelatedordepen dentobjectswithoutspecifyingtheirconcreteclasses. provideasimplecreationalinterfaceforacomplexfamilyofclasses Clientdoesnothavetoknowanyofthose
Syracuse - CSE - 776
Bridge PatternJim Fawcett CSE776 Design Patterns Summer 2006 Intent&quot;Decouple an abstraction from its implementation so that the two can vary independently.&quot; Multiple Dependent Implementations. Single Independent Interface. Motiv
Syracuse - CSE - 776
Abstract Factory PatternJim Fawcett, 20 May 2009 1. What is a creational pattern? a. CP abstracts the instantiation process, making system independent of how its objects are created, composed, and represented. 2. Why are CPs important? a. Large sys
Syracuse - CSE - 776
Data PatternsPhilip Teale, Microsoft Prescriptive Architecture Guidance Christopher Etz, Simple Fact Michael Kiel, Simple Fact Carsten Zeitz, Simple FactInformation in this document, including URL and other Internet Web site references, is subject
Syracuse - CSE - 776
%!PS-Adobe-3.0 %BoundingBox: (atend) %Pages: (atend) %PageOrder: (atend) %DocumentFonts: (atend) %Creator: Frame 4.0 %DocumentData: Clean7Bit %EndComments %BeginProlog % % Frame ps_prolog 4.0, for use with Frame 4.0 products % This ps_prolog file is
Syracuse - CSE - 776
ch01.qxd9/20/0012:45 PMPage 1ONEIntroductionSo you want to become a software architect? Or perhaps you are already a software architect, and you want to expand your knowledge of the discipline? This is a book about achieving and mai
N.E. Illinois - FIN - 3770
EASTERN ILLINOIS UNIVERSITY FIN 3770Name: _ Folder: _ (5 bonus points) Your honest answers are appreciated. Completion of this form is voluntary and your answers will not impact your grade other than you will receive five bonus points if you choo
Rose-Hulman - CHEM - 251
General FormulaR CH2 H R CH C H2Common Functional Groups in Organic Molecules General Name Name Formula Alkane Alkene AlkyneO R C H O R C R O R C OH O R C O RAldehyde Ketone Carboxylic acidR C CHRAromaticEsterR NH2 R R NH R R N RO1