27 programs for "algorithm" with 1 filter applied:

  • Your top-rated shield against malware and online scams | Avast Free Antivirus Icon
    Your top-rated shield against malware and online scams | Avast Free Antivirus

    Browse and email in peace, supported by clever AI

    Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
    Free Download
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    [OFFICIAL] tinyfiledialogs v3.19.1 C C++

    [OFFICIAL] tinyfiledialogs v3.19.1 C C++

    inputbox password WIN OSX GTK QT Console VCPKG C# Lua R Fortran Pascal

    one C/C++ file & header provides 8 functions: - beep - tray notify popup - message & question - input & password - save file - open file(s) - select folder - color picker complements OpenGL Vulkan GLFW GLUT GLUI VTK SFML TGUI SDL Ogre Unity3d ION OpenCV CeGui MathGL GLM CPW GLOW Open3D ImGui MyGui GLT NGL STB Nuklear Fenster MicroUi & GUI-less programs NO INIT NO MAIN LOOP NO LINKING NO INCLUDE win (XP to 11) ASCII MBCS UTF-8 UTF-16 (wchar_t) - native...
    Leader badge
    Downloads: 82 This Week
    Last Update:
    See Project
  • 2

    cline

    Command line tool for counting source code lines

    cline is a command line tool that counts code lines or non-whitespace characters in your project folder. It is designed to recursively find any source file matching specific rules and count the line breaks within that file. You may specify file suffixes to include or exclude as well as regular expressions for code lines that shall be excluded (e.g. to exclude comments). By default a heuristic algorithm skips binary files. You may configure the restrictiveness of this algorithm with command line...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3

    calc: C-style arbitrary precision system

    Calc: arbitrary precision C-like arithmetic & calculator

    Calc is arbitrary precision C-like arithmetic system that is a calculator, an algorithm prototyper and mathematical research tool. Calc comes with a rich set of builtin mathematical and programmatic functions.
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • Simplify IT and security with a single endpoint management platform Icon
    Simplify IT and security with a single endpoint management platform

    Automate the hardest parts of IT

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
    Learn More
  • 5
    Bandicoot

    Bandicoot

    fast C++ library for GPU linear algebra & scientific computing

    * Fast GPU linear algebra library (matrix maths) for the C++ language, aiming towards a good balance between speed and ease of use * Provides high-level syntax and functionality deliberately similar to Matlab * Provides an API that is aiming to be compatible with Armadillo for easy transition between CPU and GPU linear algebra code * Useful for algorithm development directly in C++, or quick conversion of research code into production environments * Distributed under the permissive Apache...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...: Encrypt-then-MAC (EtM), GCM, OCB, ChaCha-Poly1305, Schwaemm. Streaming AEAD. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9

    Sudoku Solver

    Sudoku solving library using bruce-force search algorithm

    The SudokuSolver class inside this library is simple and easy-to-use. It uses the bruce-force search algorithm to solve the Sudoku appeared on daily newspapers, books, etc. Continual updates to this library give you easier experiences with Sudoku solving, and can solve other sorts of Sudokus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    HPeak

    A HMM-based algorithm for defining enriched regions from ChIP-seq data

    HPeak is a hidden Markov model-based approach that can accurately pinpoint regions to where significantly more sequence reads map. Testing on real data shows that these regions are indeed highly enriched by the right protein binding sites. Command (single-end): perl /compbio/software/HPeak3/HPeak.pl -sp HUMAN/MOUSE -format BED -t TREATMENT.inp -c CONTROL.inp -n OUTPUTPREFIX -fmin 100 -fmax 300 -r 36 -ann -wig -seq -interfiles Command (pair-end): perl /compbio/software/HPeak3/HPeak.pl...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Image Sizer SImple

    Image Sizer Simple - Faster resize of your images

    Image Sizer Simple - The light version of original "Image Sizer", with no picture preview, and much faster "resizing" algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The RDXplorer is a computational tool for copy number variants (CNV) detection in whole human genome sequence data using read depth (RD) coverage. CNV detection is based on the Event-Wise Testing (EWT) algorithm recently published by our group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Peters Backup is a program for backing up your important data files on to diskette, zip drive, fixed disk or CD/RW. It uses an extremely efficient compression algorithm. It keeps track of all versions of your files in full and incremental backups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Crystallizing Substochastic Sequential Machine Extractor, CrySSMEx, is an algorithm for extracting Finite State Machines from Recurrent Neural Networks. Input: sequential data generated from RNNs. Output: (stochastic) FSMs and state space quantizers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A framework for creating board games and card games using a minimal amount of Java programming and playing them against AI or human opponents.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Ex-Crawler
    Ex-Crawler is divided into 3 subprojects (Crawler Daemon, distributed gui Client, (web) search engine) which together provide a flexible and powerful search engine supporting distributed computing. More informations: http://ex-crawler.sourceforge.net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm). It's interface is just tcp/ip socket and very easy to handle
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Web-Based Academic course system for assigning students to courses written in JAVA with pgsql DB and evolutionary algorithm for assigning students to course requests. Multiple roles for users: Admin, Student, Teacher or Tutor. International localization.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    The "Framework for Implicit Graph Algorithms and Representations by OBDDs" (Figaro) automatically manages experiments with input generator and algorithm plugins. It already contains some generators and algorithms for graph and scheduling problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Framework for blockstructured adaptive finite volume methods. Provides MPI-parallelized variant of the Berger-Oliger AMR algorithm for Beowulf-clusters. Uses Clawpack. Visualization and conversion tools for HDF4 files included.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Call for the specifications of (next generation of spice) spice4. The concept of spice kernel is proposed. The main function of spice kernel is to provide a communication between "application layer" and "low-level Algorithm layer".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Two Dimensional NOesy simulation (TDN) implementents an algorithm that creates a time-domain 2D NOesy spectrum. TDN does not calculated the nOe peak intensities, Therefore, you will need the CORMA (Complete nuclear Overhauser Relaxation Matrices).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.