This repository contains a technique based Ant Colony Optimisation heuristic for task scheduling in Cloud Computing
☆12Apr 2, 2019Updated 6 years ago
Alternatives and similar repositories for Ant-Colony-Optimization
Users that are interested in Ant-Colony-Optimization are comparing it to the libraries listed below
Sorting:
- Tamper resistant, off-site audit logging for WordPress☆14Jan 14, 2026Updated 2 months ago
- Faster manipulation of dendrogram objects in R.☆15May 22, 2015Updated 10 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- Utility methods related to public key cryptography to be used with distributed mutable storage☆15May 13, 2020Updated 5 years ago
- Haskell port of the Tensor Algebra COmpiler☆16Nov 18, 2019Updated 6 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Trimmed adblocking lists: Ads, trackers, malware and miners for average Joe and Janes☆10Sep 3, 2021Updated 4 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Yet Another sockets/HTTP framework for C++☆15Feb 28, 2014Updated 12 years ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Personal lists containing additional filters to adblock domains.☆14Jan 25, 2021Updated 5 years ago
- A simple library with extension methods to allow you to do pattern matching with fluent syntax instead of doing a switch or a dictionary.☆33Mar 28, 2013Updated 12 years ago
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆13Aug 16, 2014Updated 11 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Feb 1, 2019Updated 7 years ago
- After the Deadline extension for OpenOffice and LibreOffice☆21Aug 29, 2013Updated 12 years ago
- Rule check for Adblock filter. Mirror of https://arestwo.org/famlam/redundantRuleChecker.html (might be disappear soon). Now avaiable at …☆11Mar 11, 2026Updated last week
- Cross-platform inter-process communication.☆10Jul 1, 2015Updated 10 years ago
- Julia package for representing linear, time-invariant system models and operations defined on them.☆10Oct 18, 2019Updated 6 years ago
- Cryptographic Asymmetric Secure Storage Infrastructure☆10Jan 6, 2023Updated 3 years ago
- ☆12Apr 17, 2017Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- My attempt at creating an open-source licence that works on good faith, specifically crafted for adblock filterlist maintainers.☆15Dec 2, 2021Updated 4 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Feb 28, 2020Updated 6 years ago
- displays processes, modules and memory layout☆17Aug 4, 2020Updated 5 years ago
- Updated Next Aired addon for XBMC.☆14Feb 7, 2020Updated 6 years ago
- Android app to perform secure deletes.☆10Feb 25, 2016Updated 10 years ago
- A Ruby gem that calculates Gematria☆10Mar 15, 2013Updated 13 years ago
- ☆12Apr 14, 2017Updated 8 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Repository for service oriented architecture code and components.☆18Aug 28, 2017Updated 8 years ago
- The place to talk about our infrastructure or everything related to the Ultimate Hosts Blacklist project.☆12Oct 2, 2024Updated last year