a client-side implementation of the rsync algorithm. It allows updating of files from a remote Web server without requiring a full download or a special remote server application.
"To the first person to inform me of a legitimate bug in the code, I'll pay a bounty of US$10 (by check or Paypal). If directed to a charity, I'll pay US$20."
a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms. These algorithms can be used to compute checksums, message digests, and other signatures.
a library of functions and a framework to interface with crypto algorithms provided by the calling application, built-in, or provided through shared libraries.
"small" pieces of geometric software available on the Internet. Most of the software is available free of charge. Unless otherwise specified, C or C++ source code is available for all programs.
implements multilayer artificial neural networks in C with support for both fully connected and sparsely connected networks. Cross-platform execution in both fixed and floating point are supported. It includes a framework for easy handling of training dat
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
to aid in the development of applications that use genetic, or evolutionary, algorithms. It provides data structures and functions for handling and manipulation of the data required for serial and parallel evolutionary algorithms.
Encryption Toolkit that provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details that make the encryption or authentication work.
by Bill Green. using the Sobel and the Laplace methods."Edges characterize boundaries and are therefore a problem of fundamental importance in image processing"
a library of simple functions that are optimized for various CPUs. These functions are generally loops implementing simple algorithms, such as converting an array of N integers to floating-point numbers...