UESTC-《Parallel and Distributed Computing》Course Experiment(电子科技大学 《分布式并行计算》课程实验):Implements of Sieve of Eratosthenes,with modification and improvement,based on Windows 10,MinGW-W64 gcc version 8.1.0 and MicrosoftMPI(MSMPI)
☆20May 31, 2019Updated 6 years ago
Alternatives and similar repositories for Parallel-and-Distributed-Computing-MPI-Experiment
Users that are interested in Parallel-and-Distributed-Computing-MPI-Experiment are comparing it to the libraries listed below
Sorting:
- 电子科技大学(UESTC)计算机科学与技术专业本科生课程实验☆10Oct 19, 2022Updated 3 years ago
- 电子科技大学硕士生期间所有作业与实验报告汇总☆26Jul 12, 2024Updated last year
- This is about multimodal Weibo dataset。Due to the number and size of the images in the data set, it is not possible to upload them to Git…☆27May 17, 2021Updated 4 years ago
- 电子科技大学本科生健康打卡助手。☆89May 29, 2024Updated last year
- 🎓电子科技大学 📔课程资料☆3,684Feb 26, 2026Updated 3 weeks ago
- Tamper resistant, off-site audit logging for WordPress☆14Jan 14, 2026Updated 2 months ago
- 电子科技大学清水河校区电信网络自动接入脚本,其他网络或沙河校区暂不支持(欢迎在 ISSUE 中提供关键抓包信息)☆29Feb 18, 2024Updated 2 years ago
- Faster manipulation of dendrogram objects in R.☆15May 22, 2015Updated 10 years ago
- 用于电子科技大学(UESTC)的信签纸☆22Mar 22, 2020Updated 5 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- Utility methods related to public key cryptography to be used with distributed mutable storage☆15May 13, 2020Updated 5 years ago
- Haskell port of the Tensor Algebra COmpiler☆16Nov 18, 2019Updated 6 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Trimmed adblocking lists: Ads, trackers, malware and miners for average Joe and Janes☆10Sep 3, 2021Updated 4 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Yet Another sockets/HTTP framework for C++☆15Feb 28, 2014Updated 12 years ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Milvus file storage format repo☆42Updated this week
- Drag and drop a hosts file to convert it.☆14Jan 15, 2025Updated last year
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Personal lists containing additional filters to adblock domains.☆14Jan 25, 2021Updated 5 years ago
- A simple library with extension methods to allow you to do pattern matching with fluent syntax instead of doing a switch or a dictionary.☆33Mar 28, 2013Updated 12 years ago
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆13Aug 16, 2014Updated 11 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Feb 1, 2019Updated 7 years ago
- After the Deadline extension for OpenOffice and LibreOffice☆21Aug 29, 2013Updated 12 years ago
- Rule check for Adblock filter. Mirror of https://arestwo.org/famlam/redundantRuleChecker.html (might be disappear soon). Now avaiable at …☆11Mar 11, 2026Updated last week
- Cross-platform inter-process communication.☆10Jul 1, 2015Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Julia package for representing linear, time-invariant system models and operations defined on them.☆10Oct 18, 2019Updated 6 years ago
- Cryptographic Asymmetric Secure Storage Infrastructure☆10Jan 6, 2023Updated 3 years ago
- ☆12Apr 17, 2017Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- 用verilog实现单周期cpu和流水线☆21Dec 26, 2019Updated 6 years ago