With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Implementation of the PowerWatershed algorithm (q=2) described in the following paper (ICCV 2009)
http://www.esiee.fr/~najmanl/papers/couprie2009iccv.pdf
DPMTA is a portable implementation of the Paralel Multipole Tree Algorithm (PMTA) for evaluation of all-pairs N-Body interactions. The algorithm is an enhanced version of Greengards FMA. DPMTA runs as a serial or parallel process under MPI.
Turn Your Content into Interactive Magic - For Free
From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.
Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
The Automated Optimization Algorithm Benchmarking system is intended to provide researchers in numerical optimization with a simple tool which allows them to run and evaluate experiments in a distributed, automated way.
A VisAnt (http://visant.bu.edu/) layout plugin that supports compound structures. The algorithm (http://dx.doi.org/10.1016/j.ins.2008.11.017) has an implementation available in sourceforge project chiLay (https://sourceforge.net/projects/chilay/).
Another project based on the famous Tic-Tac-Toe game. The AI is based on the Minimax algorithm. Design: Julian Kuntorov ( http://juliank.eu/ ) , Development: Me :)
Hi! My name is Marinescu Bogdan a 3rd grade student in University of Pitesti and i'm working on a project to fill a polygon based on a triangularization
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
A small encryption / decryption application that we are giving away free of charge.
Version 1.0.00 - RSA only at the moment.
But later versions will have a plug-in system for adding more algorithms.
Extremely Lightweight Beat Detection Algorithm - BeatDetektor uses a very simple statistical model designed from scratch by myself to detect the BPM of music and provides real-time feedback useful for visualization and synchronization.
LEA is a lightweight eyetracking algorithm library (hence the name) written in and for Java. LEA is able to track eye movements with an ordinary webcam and returns relative movements (up, down, ...). It is also able to compensate for slight head motions.
This is a 3D polygonal model viewer. It has a few model examples already packaged with the software. The main place it needs development is finding the best depth sort algorithm for the polygons.
Juggernaut is a high throughput out of core sequence assembly algorithm. This program is very useful in assembly projects involving massive number of short reads which originate from high coverage of the
genome.
Ink Spill is a clone of the puzzle game Flood It. The player must convert a multicolored board to one color by using colors and the flood fill algorithm. Implemented with Python using Pygame.
The CMASA (Contact MAtrix based local Structural Alignment algorithm) were used in detecting local protein structural similarity. And it can be applied to enzyme catalytic site annotation. Also visit: http://159.226.149.45/other1/CMASA/CMASA.htm
BorderFlow implements a general-purpose graph clustering algorithm. It maximizes the inner to outer flow ratio from the border of each cluster to the rest of the graph.
Game Toolbox is a C# assembly designed to facilitate the creation of games and game prototypes. It contains no graphics code, does not depend on XNA, and is Mono-compatible. It provides implementations of A*, GOAP, a genetic algorithm, and more.
OpenMPagrep and CUDAagrep are respectively OpenMP and CUDA implementation of agrep algorithm for approximate DNA string matching. Both OpenMPagrep and CUDAagrep are free of charge and open source. Users can modify the source at their own risk.
A Visual Basic implementation of Bruce Schneier's Solitaire Encryption Algorithm that encrypts plain text by means of a deck of ordinary playing cards.
this just an experiment of cryptography. I mixed two cryptography algorithm in this program. But I need your participation to break the code to help me improve the quality of algorithm. Thanks. Sorry for my poor english