Showing 19 open source projects for "ns2 code with algorithm"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    Boehm-Demers-Weiser Garbage Collector

    Boehm-Demers-Weiser Garbage Collector

    The Boehm-Demers-Weiser conservative C/C++ Garbage Collector

    The Boehm-Demers-Weiser conservative garbage collector can be used as a garbage collecting replacement for C malloc or C++ new. It allows you to allocate memory basically as you normally would, without explicitly deallocating memory that is no longer useful. The collector automatically recycles memory when it determines that it can no longer be otherwise accessed. The collector is also used by a number of programming language implementations that either use C as intermediate code, want...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    .... Migration paths and checks are included so you can upgrade algorithms or work factors over time without breaking existing credentials. Its focus on practical ergonomics—clear APIs, sensible defaults, and good docs—has made it the de facto choice for password handling in Elixir. By centralizing hashing concerns, Comeonin helps teams avoid subtle security mistakes while keeping authentication code terse and testable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Scheduler Simulation

    Thread Scheduler with custom asynchronous messaging in VC++

    Custom thread scheduler with custom data-structure and scheduling algorithm. Custom Mutex, Semaphore implementation and asynchronous messaging system that combines Observer and Visitor patterns. System is implemented on top of Windows system and not ported to any hardware, uses Windows thread for context saving. Code also has tested common data-structure implementation. System is designed for multi-core platform. System is tested at basic level, not fully. Press Command run button after...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    playqt

    playqt

    GUI version of ffplay for Windows

    playqt is a Windows GUI version of the well known ffplay program and has been enhanced with Object Detection capabilities. It can process multiple types of media including real time streams. An integrated camera control feature allows control over the camera parameters as well as automatic network configuration and connection. See the README under the files tab for configuration info. Real time object counting is implemented using YOLO detection algorithm. The program can be used...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    clzw

    clzw

    Implementation of LZW compression algorithm in C

    Simple, fast implementation of LZW (Lempel–Ziv–Welch) data compression algorithm in C. - Console encoder/decoder tools - OS independent - Could be used in embedded projects - Works with raw code-stream LZW features: - Hardcoded dictionary size - Variable code size - Code search is performed by hash table and embedded in dictionary linked lists (encoder) - No dynamic memory allocation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    lzhw

    lzhw

    LZHW Windows command line lossless compression tool for tabular files

    LZHW Command Line Lossless Compression Tool is a Windows command line tool used to compress and decompress files from and to any form, csv, excel etc without any dependencies or installations. Using an optimized algorithm (LZHW) developed from Lempel-Ziv, Huffman and LZ-Welch algorithms. The tool can work in parallel and most of its code is written in Cython, so it is pretty fast. It is based on python lzhw library. Full tool documentation can be found at: https...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Gutmann Algorithm Secure File Deletion

    Using Gutmann method for securely deleting files in Windows.

    Gutmann method uses 35 passes over the region to be deleted, 8 of them are Pseudo-random. Considered by some to be highly effective for preventing file recovery. Requires .NET Framework 4.0 --- Systems & Safety Establishment https://sarab.me Source Code available in c# with comments. Reference: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Preesm
    PREESM provides a complete framework for fast prototyping. It generates a simulation and an optimized multiprocessor code from graph descriptions of algorithm and architecture. Please visit the project homepage at http://preesm.sourceforge.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 10

    Recursive Directory Removal

    Recursive Directory Removal

    https://github.com/mhisoft/rdpro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    LZWStream

    The LZW algorithm in C#

    Implementation of the LZW algorithm in C#, adhering to the built-in System.IO.Compression. The algorithm and code is much improved, compared to projects like SharpLZW. The LZW algorithm is for arbitrary lossless data compression and are noticeable for simplicity and low (compared to others) memory consumption. Making it interesting for eg. embedded use. There're many other LZW implementations out there. This one is focused on KISS and C#.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 13

    Online XOR Coding

    Online XOR packet coding BENEFIT

    The project page provides the source code of custom built simulators used in our publications whose URL are given as follow: http://dx.doi.org/10.1016/j.comcom.2013.09.006 http://dx.doi.org/10.1109/PIMRC.2009.5449983 The titles of the papers are: Online XOR packet coding: Efficient single-hop wireless multicasting with low decoding delay (COMCOM VERSION). An efficient network coding based retransmission algorithm for wireless multicast (PIMRC VERSION). Help (README) files...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    Simple GUI based lightweight duplicate file finder and remover. Configurable file search and preview (via external tools) option for file data. No command-line interface available! This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made. Algorithm is simple and suitable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Positioning Algorithms

    Positioning Algorithms for Mobile Ad Hoc Networks.

    The DV-Hop, Amorphous, Centroid and APIT source code for NS2. Please reference this work as follows: A. Pineda-Briseño, R. Menchaca-Mendez, E. Chavez, G. Guzman, R. Menchaca-Mendez, R. Quintero, M. Torres, M. Moreno, and J. L. Diaz-De-Leon. "A Probabilistic Approach to Location Estimation in MANETs." Ad Hoc & Sensor Wireless Networks, vol. 28, no. 1-2, pp. 97-114, 2015.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    Ermdia is a yet another implementation of Kademlia, which is one of the algorithm of ditributed hash table (DHT), in Erlang. This software is lightweight, fast and easy to understand since an amount of source code is quite small.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Firefly's Clean Lzo

    A human-readable ISC-Licensed implementation of the LZO1X algorithm.

    LZO is a compression library which is widely used around the world. The main problem with LZO is that it is absolutely not human readable. People have done crazy stuff to get LZO to run in their language. Usually it implies inline assembly or trying to execute data which actually contains machine code. This is sick. Whoever is responsible for this sorry situation ought to be ashamed. So I'm going to deobfuscate LZO and provide a ISC implementation of this algorithm in Python and C...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.