algorithm freeware downloads


Search results for «algorithm»:

Genetic Algorithm Viewer 1.0 Genetic Algorithm Viewer 1.0
… arge part of mathematical development during the XVIIIth century dealt with that topic (remember those always repeated problems where you had to obtain the derivative of a function to find its extremes). Purely analytical methods widely proved the… 

FileEncryptor 1.0.6.0 FileEncryptor 1.0.6.0
… les safe no matter what happens because AES encryption algorithm has been proven to be unbreakable.… 

LIFE ScreenSaver 1.0 LIFE ScreenSaver 1.0
… ls on the screen. Requirements Microsoft .NET Framework 2.0… 

ABI- CODER 3.6.1.4 ABI- CODER 3.6.1.4
… user has any decryption software installed. The program is easy to use and comes with help files as well as hints to guide you along the way. ABI- CODER currently features the following encryption algorithms: - 448 bit Blowfish encryption algorithm - 168 bit 3DES encryption algorithm … 

DLOCK2 2.01 DLOCK2 2.01
… Gnu C++ and other compilers, so it can be adapted to many operating systems.… 

TSP 1.0 TSP 1.0
… it The .zip file also includes a sample program using this class… 

Onda Lossless Audio Compressor 1.3 Onda Lossless Audio Compressor 1.3
… uded in or excluded from a compressed file.… 

448 Bit Marx Encryption 1.0 448 Bit Marx Encryption 1.0
… 76K, it is also one of the most compact. Tiger-192 is the only major hashing algorithm that has yet to be broken, both SHA-1 and MD5 have both been compromised in recent years. Requirements .NET framework 2.0… 

EyePlayer 0.3 build #22 EyePlayer 0.3 build #22
…  one. You can use the MP3 Search function. Just type in the directory where you keep your MP3s, and EyePlayer will do the rest. If one of your MP3s doesn't have any artist or song name setted with the ID3Tag then EyePlayer will use the Braveheart algorithm to find out. If there are any duplica… 

DiamondCS MD5 1.0 DiamondCS MD5 1.0
… companied by an MD5 'hash' (or 'checksum'). This serves as a unique identifier for the contents of the file - if the file contents change then so does the MD5 hash, making it easy to verify the integrity of files. A brief description of MD5: The algorithm takes as input a message of arbitrary le… 


Related: