Showing 5 open source projects for "ns-2"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    xRecurseDiff

    xRecurseDiff

    A developer tool to rapidly compare sources tree

    ...Search can be case-insensitive and limited by a char filter. In "library" working mode it compares only files basenames, while in "project" mode it compares relatives paths too. In "files" working mode it compares directly two files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ...NOTE: This project has now moved to https://github.com/paulross/cpip. This is no reflection on Sourceforge, indeed I am very grateful for them hosting CPIP for may years. It is merely because I can't manage two workflows!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ...It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Cov is a code coverage tool to get your code coverage after your runuing some steps for your programs.It is based on llvm(Low Level Virtual Machine,http://llvm.org/).Now,it's only a begining,so welcome anybody to join in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    A quick and simple way to create a source code report. Counts lines of code and compares two directories for line changes, line adds, and line deletes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB