MISRA-C:2004 simplest rules checker
☆28Feb 24, 2011Updated 15 years ago
Alternatives and similar repositories for misra-c
Users that are interested in misra-c are comparing it to the libraries listed below
Sorting:
- FIFO based tox client --- fork of http://git.2f30.org/ratox/☆10Sep 19, 2015Updated 10 years ago
- @ https://gitlab.com/MISRA/MISRA-C/MISRA-C-2012/Example-Suite☆34Nov 8, 2019Updated 6 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- create symbol tables from a text file☆39Jul 25, 2013Updated 12 years ago
- A framework, data and configs for generating and building Tesseract OCR lang.traineddata model files, specifically for Japanese☆10Dec 9, 2013Updated 12 years ago
- Our Diploma Final year major project Visior Gate Pass System (VGPSYS). A Web app serving as a great advancement to an organization visito…☆11Nov 23, 2025Updated 3 months ago
- Madek main web interface☆21Updated this week
- Grecka is a python script to convert Greek to Greeklish based on ELOT 743☆12Aug 4, 2018Updated 7 years ago
- Speech ANDroid Apps☆20Jan 22, 2014Updated 12 years ago
- 大话设计模式Java示例☆10Aug 19, 2017Updated 8 years ago
- Collection of tools for fetching and processing Street View imagery, adapted from code by @kotarohara☆12Feb 13, 2026Updated 3 weeks ago
- An ESM package that uses Web Streams API to create v1, v2 or hybrid torrents in your web browser☆10Aug 5, 2025Updated 7 months ago
- Cisco Meraki CMX WiFi Presence receiver☆12Apr 17, 2019Updated 6 years ago
- JS library that helps get the closest AWS region from a country code☆12Jan 14, 2023Updated 3 years ago
- (Labeled) Latent Dirichlet Allocation on a sentence level with Gibbs Sampling☆10Mar 27, 2014Updated 11 years ago
- A plug-in architecture for extending Siri virtual assistant☆29Mar 30, 2014Updated 11 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- Source code for this blog post: http://marceldegraaf.net/2014/05/05/coreos-follow-up-sinatra-logstash-elasticsearch-kibana.html☆27May 4, 2014Updated 11 years ago
- Brand disambiguator for tweets to differentiate e.g. Orange vs orange (brand vs foodstuff), using NLTK and scikit-learn☆58Jul 11, 2013Updated 12 years ago
- IDAPython-1.0.0 patches and .def file needed to build for IDA 5.0 free☆11Feb 20, 2015Updated 11 years ago
- Human-friendly query language for Elasticsearch☆23Jun 8, 2021Updated 4 years ago
- dsPIC33E Code Examples☆16Oct 15, 2025Updated 4 months ago
- Demo project for Continuous Integration - from the book Continuous Integration (Duvall, et. al)☆23Jun 19, 2020Updated 5 years ago
- An example of centralising clojure/java logging with Logback, LogStash, ElasticSearch, and Kibana☆17Mar 27, 2014Updated 11 years ago
- Repository for UC Santa Cruz's work on Libresoft's CVSAnalY☆15May 13, 2013Updated 12 years ago
- A Graph Rewriting Tool for Plot Generation, uses Graph Grammars☆11Mar 3, 2014Updated 12 years ago
- Script to automatically perform zonal OCR on a PDF and rename the PDF according to the results.☆15Jul 24, 2014Updated 11 years ago
- SNOBOL/SPITBOL pattern matching in JavaScript☆10Apr 2, 2021Updated 4 years ago
- Scripts for building cross-toolchain Mingw-w64 --> MSYS2☆13Jan 8, 2015Updated 11 years ago
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago
- C++ implementation of internal logic of a rotor cipher machine Enigma, which was used by German forces in WWII☆14Sep 12, 2023Updated 2 years ago
- Semantic dependency relationship extractor untuk bahasa Indonesia... termasuk bahasa gaul dan alay ;) (terinspirasi oleh OpenCog RelEx)☆10Oct 2, 2015Updated 10 years ago
- A windows dll call hellper☆14Dec 19, 2014Updated 11 years ago
- A grab-bag of half-baked projects around Emulating M6809 and Doing NitrOS9/OS9.☆12Mar 11, 2025Updated 11 months ago
- A clone of Windows Security Center mainly useful for demonstrating Windows APIs for accessing Firewall/AntiVirus/AntiSpyware/Windows Upda…☆12May 10, 2010Updated 15 years ago
- Javascript bayesian network library, inference, learning☆15Nov 8, 2019Updated 6 years ago
- Compute the most likely permutation of a lattice given an LM☆10Jan 3, 2013Updated 13 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Sep 27, 2017Updated 8 years ago
- ☆10Mar 31, 2016Updated 9 years ago