Evolving Realistic Topologies for Wireless Network Simulation
Protect your personal data with SafePassDB.
JBernstein: Exploration techniques for non-linear constraint checking
OS independent mouse rate checker written in Java.
Remote computer access through Android devices
File manager software
F-Talk cross-platform p2p encrypted secure voip software
Web Based IaaS Cloud Controller (VimCloud)
peer to peer social network
jEncrypt is a command line file encryption archiver
Select the files you want backed up.
Kerberized Messaging Toolkit for Java
WiFi Hot Spot using WindowsXP, Windows 7 and 2008 R2
Generate adaptation contracts between incompatible services