Portfolio and risk analytics in Python
The implementation of an algorithm presented in the CVPR18 paper
Repository implemented in Objective-C with sorting algorithms
Egg.js middleware that uses encrypted token to authenticate
Simple Bucket Fill Demo
Using Gutmann method for securely deleting files in Windows.
Code for the paper "Evolution Strategies.."
Stanford Javascript Crypto Library
Scannerless GLR parser generator
Creates a battleship puzzle with a twist - some numbers are false
Prediction of proteinfolding in 2D HP model
Solve 9x9 Sudoku Puzzles Using A Command Line Utility
Gapless, draggable grid layouts
Basic, concurrent algorithm
A UNIX-like kernel for the i386 architecture
Karel - 3D language interpreter
LAIM: A Linear time iterative influence maximization algorithm
Matlab codes for feature learning
IDA Pro plug-in of Luigi Auriemma's signsrch signature matching tool.
Binding site descriptor generation for SVM based classification.