11 programs for "ns2-allinone-2.35" with 1 filter applied:

  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • Component Content Management System for Software Documentation Icon
    Component Content Management System for Software Documentation

    Great tool for serious technical writers

    Paligo is an end-to-end Component Content Management System (CCMS) solution for technical documentation, policies and procedures, knowledge management, and more.
  • 1
    The DejaVu fonts are a font family based on the Bitstream Vera Fonts. Its purpose is to provide a wider range of characters while maintaining the original look and feel. After version 2.35 (May 2015), the source is maintained at https://github.com/dejavu-fonts/dejavu-fonts
    Leader badge
    Downloads: 4,186 This Week
    Last Update:
    See Project
  • 2
    iiitbaodv-gpu-aodv-IIIT Bangalore
    The project is implemented as part of the CS-110 operating system course at IIIT Bangalore 2013. Aodv protocol is implemented on GPU using CUDA 4.0. A significant gain in execution time is observed when compared to CPU. Thus a simulator which uses GPU can be built on similar lines of NS2 if all the protocols can be parallelized and implemented on GPU. Guide: Prof Shrisha Rao srao@iiitb.ac.in Prof Poonacha P G poonacha.pg@iiitb.ac.in Students: Abhilash C S abhilash.gowder...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    aodv protocol on gpu IIIT Bangalore
    The project is implemented as part of the CS-110 operating system course at IIIT Bangalore 2013. Aodv protocol is implemented on GPU using CUDA 4.0. A significant gain in execution time is observed when compared to CPU. Thus a simulator which uses GPU can be built on similar lines of NS2 if all the protocols can be parallelized and implemented on GPU. Guide: Prof Shrisha Rao srao@iiitb.ac.in Prof Poonacha P G poonacha.pg@iiitb.ac.in Students: Abhilash C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    UM-OLSR is an OLSR (Optimized Link State Routing protocol) implementation for the ns2 network simulator.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 5
    Worst Cases is a python script that enables calculations on worst case objects. Like a calculator operating on worst cases (e.g. [1,2,3]) rather than on real numbers (2.35) WARNING: This program is released as is, and has never been extensively teste
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Jtrana is a Java-based NS-2 wireless simulation trace analyzer. Its input is an NS2 wireless trace, and its output is a graph or data-set that can be plotted with other tools such as Gnuplot.Any problem,plz visit:http://ns2trana.googlepages.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    OPENOLSRV2 is an OLSRv2 (Optimized Link State Routing protocol version 2) implementation for the ns2 network simulator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Design and implementation of the Observation-based Cooperation Enforcement in Mobile Ad-hoc Networks (OCEAN) protocol, on top of the ns2 network simulator, using Dynamic Source Routing (DSR).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The goal of this project is to be an improvement of the original Network Animator (NAM) module provided as part of the Network Simulator 2 (NS2). This tool provides topology visualization, TCL script generation, and enhanced simulation animation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 10
    This project contains simulation codes of Dr. Jie Wu's wireless networking group at FAU, including a dominating set simulator (ds) and ns2 extensions for various virtual backbone formation, broadcast, and topology control schemes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    A Graphical Editor and Animator for the ns-2 Network Simulator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next