Thread safe linked list data structure for C
☆23Apr 16, 2021Updated 5 years ago
Alternatives and similar repositories for ll
Users that are interested in ll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LwIP 2.1.2 版本的源码中文注释☆17Mar 7, 2020Updated 6 years ago
- A sample kernel module showing the memory reordering.☆12May 30, 2020Updated 5 years ago
- (SOFTSTAR official project)SDL-based reimplementation of the classic Chinese-language RPG "Xiān jiàn Qí Xiá Zhuàn" (also known as PAL).☆12Jan 20, 2022Updated 4 years ago
- ☆19Sep 5, 2022Updated 3 years ago
- ☆15Jun 26, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- standalone boost preprocessor library☆13Apr 16, 2013Updated 13 years ago
- STM32F103C8T6-SI4432_SMT点对点无线透传。☆13May 5, 2017Updated 9 years ago
- 👓 OpenCPU示例代码☆12Nov 18, 2019Updated 6 years ago
- A chained hash table implemented in C☆17Oct 19, 2021Updated 4 years ago
- Html As Markdown. Transparently edit an html file using markdown.☆43Aug 11, 2015Updated 10 years ago
- Tiny C Compiler☆22Apr 29, 2020Updated 6 years ago
- Golang parser combinator library inspired by haskell parsec☆17Dec 7, 2025Updated 5 months ago
- Source code of KVM☆20Aug 14, 2022Updated 3 years ago
- Mirror of https://dev.v4.games/v4games/eco2d☆30May 29, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Flash is a Gleam package enabling structured logging in both Erlang and JavaScript environments☆18Oct 21, 2025Updated 6 months ago
- Concurrent hash tries for C++ 14 with no memory management whatsoever.☆10Aug 30, 2016Updated 9 years ago
- A reverse proxy that provides authentication with Google, Github or other provider☆20Mar 17, 2022Updated 4 years ago
- 将星空系列汉字编码方案挂载到小小输入法。☆13Updated this week
- Source code of QEMU☆19Apr 15, 2021Updated 5 years ago
- Security and safety is an essential feature for this product.☆11Feb 27, 2016Updated 10 years ago
- code of blog☆17Sep 7, 2020Updated 5 years ago
- Check the dependencies of tools-deps-based Clojure projects for vulnerabilities☆13Apr 17, 2019Updated 7 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- µCOS-II☆16Jul 3, 2018Updated 7 years ago
- A pair of TUN/TAP drivers that wrap frames in UDP packets or SLIP/FIFO frames.☆18Feb 3, 2018Updated 8 years ago
- Autodesk Forge Viewer WebComponent☆10Dec 30, 2022Updated 3 years ago
- 用C#写的串口收发应用程序☆14Sep 26, 2019Updated 6 years ago
- Sprog (Danish for 'Language') string parsing library☆17Dec 1, 2023Updated 2 years ago
- TLA+ specifications and proofs of Logless Dynamic Reconfiguration in MongoDB Replication.☆16Dec 16, 2024Updated last year
- Command Line Interface for STM32 Nucleo boards, use FreeRTOS CLI.☆15May 19, 2015Updated 10 years ago
- ☆11Nov 28, 2019Updated 6 years ago
- Open memory disaggregation☆25Apr 21, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- For projects built with the GNU toolchain.☆11Mar 7, 2020Updated 6 years ago
- Synchronous Asynchronous Log Output Framework(同步异步日志输出框架)☆21Mar 2, 2020Updated 6 years ago
- CRC Theory and Implement. explain initial value of CRC☆16Feb 26, 2021Updated 5 years ago
- Simple JavaScript showcase application based on pattern☆13May 16, 2017Updated 8 years ago
- A simple queue using a linked list written in C under the BSD license.☆18Jun 25, 2017Updated 8 years ago
- 一个用于go语言的log模块。☆17Jul 21, 2022Updated 3 years ago
- Benchmarks for locking algorithms as well as implementations of locking algorithms.☆25Mar 6, 2018Updated 8 years ago