4 projects for "predator" with 1 filter applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    TreeLiker

    TreeLiker

    TreeLiker is a collection of fast algorithms for working with complex

    TreeLiker is a collection of fast algorithms for working with complex structured data in relational form. The data can, for example, describe large organic molecules such as proteins or groups of individuals such as social networks or predator-prey networks etc. The algorithms included in TreeLiker are unique in that, in principle, they are able to search given sets of relational patterns exhaustively, thus guaranteeing that if some good pattern capturing an important feature of the problem exists, it will be found. In experiments with real-life data, the algorithms were shown to be able to construct complete non-redundant sets of patterns for chemical datasets involving several thousands of molecules as well as for comparably large datasets from genomics or proteomics. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    PredatorPreySimulation is a graphical Java application for simulating a predator prey ecosystem using the Volterra-Lotka equations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Wesen

    Wesen

    Predator-Prey simulation with programmable AI wars.

    Wesen is german for something alife. You can program the instincts of a species - and let them fight against others (not only by fight but by best survival). This way, you can do nice programming contests and learn python by the way!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JaWator is a Wa-Tor JavaApplet; a predator-prey simulation resembling a natural ecosystem, this Cellular Automaton delivers fluctuations similar to the Lotka-Volterra equation. Inspired by A.K. Dewdney, Wa-Tor ecosystem (Scientific American, 1984)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB