Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.
Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
Click to perfect your product now.
Test your software product anywhere in the world
Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.
Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
This project provides a JAVA library and a graphical user interface which implement the "FastICA" algorithm based on the paper "Fast and Robust Fixed-Point Algorithms for Independent Component Analysis (ICA)" by Aapo Hyvärinen.
Magic Cube Cryptography is a new algorithm of cryptography and at future a program of data security in linux. The ideia is to create a safe and fast cryptography algorithm in C and x86-assembly.
This project aims to provide developers a convenient library about graph theory algorithm and some basic data structures. It will be developed in Java via Eclipse IDE, supporting both win32 and linux systems, and published as jar files.
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
This distribution contains a novel fast CRC generation algorithm developed by Intel. This algorithm runs at under 3 cycles per byte (vs. 7) and thus triples the performance of existing CRC implementations. Slicing-by-8 uses an 8KB cache footprint.
Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
PseudoKu is a SuDoKu puzzle game and is intended to allow the user create their own puzzle from scratch, generate new puzzles depending on skill level, and save to and load from files. The game solves puzzles using Donald Knuth's Dancing Links Algorithm.
Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
The OSCAR Backup System is a PERL powered graphical frontend for rsync over ssh backups in the Windows environment. The Rsync algorithm and SSH tunnel encryption makes this archival tool extremely secure and efficient.
MultiBoost is a C++ implementation of the multi-class AdaBoost algorithm. AdaBoost is a powerful meta-learning algorithm commonly used in machine learning. The code is well documented and easy to extend, especially for adding new weak learners.
PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
SciMark2 is a benchmark created by NIST to benchmark the numeric capability for Java. This project extended to to by implementing the same algorithm to different languages, esp. FORTRAN, to benchmark and compare the nuumeric capability of FORTRAN vs. Java
Decompression algorithm for ARJ. If the archive is garbled with a forgotten password, it tries to recover it. Optionally, an exhaustive search generator or a wordlist can be used.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
A Python and ANSI C implementation of the Edelsbrunner hyperplane arrangement algorithm described in his book Algorithms in Combinatorial Geometry, supporting arbitrary dimensions, exact rational arithmetic using gmp, and using David Avis lrs solver.
My program to make possible simulation of algorithm on 3-dimensional graph. We can also to create or load 3-dimensional graph and start differents algorithm. On my home page is available this program as applet. You can run applet if you were using a Java
The Zip Code Database project exists to provide US Zip Codes in their entirety; latitude and longitude coordinates included! See the home page for the distance calculation algorithm.
KU1K is a set of tools for 4D,5D and 6D compact U(1) lattice gauge theory Monte Carlo simulation using the Skipis-Vantzos algorithm. As the calculations involved, even for the 4D case, are consuming, the project is modular so as to run on the Grid.