Showing 420 open source projects for "java security for linux"

View related business solutions
  • Get Avast Free Antivirus | Your top-rated shield against malware and online scams Icon
    Get Avast Free Antivirus | Your top-rated shield against malware and online scams

    Boost your PC's defense against cyberthreats and web-based scams.

    Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
    Free Download
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    algebrain

    Math Parser for Java

    Moved to GitHub https://github.com/fedups Algebraic equation processing at run time for Java programs. Supports variables, functions with parameters, rate table lookups, an embedded "if" function... Infinitely extensible, very small footprint.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Java generic Iterator implementation to generate permutations and combinations. Uses the algorithm described here http://en.wikipedia.org/wiki/Steinhaus%E2%80%93Johnson%E2%80%93Trotter_algorithm#Even.27s_speedup and the clear description of that algorithm here: http://www.cut-the-knot.org/Curriculum/Combinatorics/JohnsonTrotter.shtml
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Programming Accessory Kit

    Programming Accessory Kit

    PAK is a collection of library code to handle the overhead of coding

    PAK is a collection of library code to handle the overhead of coding things like read-write locks, reflective multithreaded programming and simple file io. This is a java library collection, please see my API below...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Operations Research EXperiment Framework for Java
    Downloads: 1 This Week
    Last Update:
    See Project
  • Powering the best of the internet | Fastly Icon
    Powering the best of the internet | Fastly

    Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.

    Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
    Try for free
  • 5
    Common classes for the Ballistic software
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Common classes to perform mathematical operations
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Technical analysis library with indicators like ADX, MACD, RSI, Stochastic, TRIX... includes also candlestick pattern recognition. Useful for trading application developpers using either Excel, .NET, Mono, Java, Perl or C/C++.
    Leader badge
    Downloads: 11,455 This Week
    Last Update:
    See Project
  • 8
    Abandoned version of qbc. DOES NOT WORK properly
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java Combinatorial Optimization Platform
    Java Combinatorial Optimization Platform is used to solve combinatorial problems using common interface, providing means to easily add new algorithms and problems and to benchmark them.
    Downloads: 1 This Week
    Last Update:
    See Project
  • MongoDB 8.0 on Atlas | Run anywhere Icon
    MongoDB 8.0 on Atlas | Run anywhere

    Now available in even more cloud regions across AWS, Azure, and Google Cloud.

    MongoDB 8.0 brings enhanced performance and flexibility to Atlas—with expanded availability across 125+ regions globally. Build modern apps anywhere your users are, with the power of a modern database behind you.
    Learn More
  • 10
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Mouse Run

    Mouse Run

    Programming Game, A Practice Tool for Building Intelligent Things

    Mouse Run is a programming game where programmers can implement a mouse and let it run in a maze to hunt of cheese. It is a battle among programmers to test who can build the most intelligent mouse, given limited information during the game. Programmers need only implement one code file, extending from an abstract class that will contain the logic of the individual mouse. The game Host will gather all the mouse implementation and let them run in the maze. It is real fun for...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Rating AnalyzerTask for iQser GIN

    niPRO AnalyzerTask to calculate the rate popularity

    AnalyzerTask for calculating the rate popularity for ContentObjects integrated into the iQser GinServer. Developed by niPRO-Project.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    Signavio AnalyzerTask for iQser GIN

    niPRO Signavio Process BPMN 2.0 AnalyzerTask

    AnalyzerTask for Signavio BPMN Processes integrated into iQser GinServer. Developed by niPRO-Project.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    BinBase

    BinBase is a software for the automatic analysis of Massspec data from

    BinBase is a software for the automatic analysis of Massspec data from LECO GC-Tofs. All code and documentation has been moved to the google code site of this project: https://code.google.com/p/binbase/ And support is provided by the company coding and more, which can be reached under: contact@codingandmore.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    quadGT

    Software package for the joint genotyping

    quadGT is a software package for the joint genotyping of two parents, child’s normal genome and child’s tumor genome based on sequencing reads aligned to a reference genome.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    A light-weight group communication system/library of distributed algorithms implementations for agreement problems (e.g., Consensus, Unreliable Leader Election and Atomic Broadcast).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HL72XML Transformer
    HL7 to XML Transformation toolkit. Using HL7 v2 XML
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    FJSP Software

    FJSP Software

    A Software for Flexible Job Shop Scheduling

    Flexible job shop scheduling problem (FJSP) is very important in many fields such as production management, resource allocation and combinatorial optimization. In the real manufacturing systems, each operation could be processed on more than one machine and each machine can also process several operations. This feature is known as flexibility. You can define your problem in this software and get an optimal solution as a Gantt Chart. This software is based on my M.Sc. thesis of Shahed...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Sample code, algos, what you got?
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    QMC Logic Minimizer

    QMC Logic Minimizer

    combinational logic functions minimization

    ... variables. - You can also reduce the number of table rows. - It allows you to name the input and output variables. - The table can be exported to HTML file and then you can use it in e.g. MS Word. - This program provides a comfortable interface, you can change fonts and colors. - It works on MS Windows, GNU/Linux, Mac OS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    Robotypo

    Robotypo Web app hosts battles between robots - simple Java programs.

    Robotypo is a Web app which hosts battles between robots - simple Java programs. This project is the Eclipse project archive of RobotypoCreator, which is for creating robots on Robotypo: http://robotypo.appspot.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    IDA (Java)

    Java implementation of the IDA

    Information Dispersal Algorithym (IDA) is a method to split a file f into n pieces in such a way that the file can be reconstructed from some predefined subsets of pieces. this is a Java implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java library for operations with Iterables and other data structures in functional way.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    gundercrypt [MOVED]

    A CLI text encrypting/ciphering program and library for java

    ** MOVED: to github.com/gundermanc/gundercrypt A CLI text ciphering program and library written in java that makes use of pseudo random numbers and a password (provided by the user) to generate encrypted text by selectively shifting each subsequent letter by a pseudo-random index, encoding it as a letter stored in a hidden position within the String, and then re shifting the encrypted String again by numeric values deduced from a password to provide a dual layer of security. Easily can...
    Downloads: 2 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.