Algorithm
1 TrendMedium
Equis MetaStock
Equis MetaStock Add-on based on genetic algorithm.
Equis MetaStock Add-on based on genetic algorithm.
2 TradingSolutions
Financial analysis
Financial analysis software that combines traditional technical analysis with neural network and genetic algorithm technologies.
Trading Software Tradingsolutions Neural Click Analysis Network Technical Trader Stocks Neurodimension Futures Financial Here Services Ndcom Licensed Optimization Privacy Forex
Financial analysis software that combines traditional technical analysis with neural network and genetic algorithm technologies.
Trading Software Tradingsolutions Neural Click Analysis Network Technical Trader Stocks Neurodimension Futures Financial Here Services Ndcom Licensed Optimization Privacy Forex
3 Clickey
Search engine
Search engine and domain directory populated exclusively with top-level domain names. Its algorithm rotates relevant sites in the results.
Search engine and domain directory populated exclusively with top-level domain names. Its algorithm rotates relevant sites in the results.
4 Archipelago
Order entry
Order entry and execution system for Nasdaq and listed stocks. Features include anonymous access to all displayed Nasdaq market participants, SmartBook TM proprietary execution algorithm.
Markets Redirectedautomaticallyequities Click Here Please
Order entry and execution system for Nasdaq and listed stocks. Features include anonymous access to all displayed Nasdaq market participants, SmartBook TM proprietary execution algorithm.
Markets Redirectedautomaticallyequities Click Here Please
5 Intelligent Lookup Services Inc.
Provides a
Provides a name matching algorithm that updates and enhances contact information such as phone numbers, email addresses, and mailing addresses for marketing professionals. Creates targeted residential and business direct mailing lists.
Append File Services Send Call Phone Lookup Contact Terms Policy Faqs Intelligent Programs Privacy Mailing Do Centers Indicator Appliance Communications Quote
Provides a name matching algorithm that updates and enhances contact information such as phone numbers, email addresses, and mailing addresses for marketing professionals. Creates targeted residential and business direct mailing lists.
Append File Services Send Call Phone Lookup Contact Terms Policy Faqs Intelligent Programs Privacy Mailing Do Centers Indicator Appliance Communications Quote
6 Triple Ring Technologies
Partners and
Partners and consultants in the development of technology-intensive products. Decades of experience in signal detection and measurement, sensor and device design, image processing, algorithm development, software design, and systems engineering.
Product Gt Learn Here Click Science Development Publications Company Life Medtech Industrial Grant Author Please Literature Support
Partners and consultants in the development of technology-intensive products. Decades of experience in signal detection and measurement, sensor and device design, image processing, algorithm development, software design, and systems engineering.
Product Gt Learn Here Click Science Development Publications Company Life Medtech Industrial Grant Author Please Literature Support
2. Shopping and Algorithm Trade
1 Gas Absorption Program
GAP is
GAP is a free downloadable decompression program that utilizes unpadded bulhmanns decompression algorithm for mixed gas decompression.
Dealer Version New Gap Rgbm Rel Software Buhlmann Decompression Diveplanner Android Release Techdive Support Testimonials Info@gap Softwarecom Theapplication Downloads Instruction
GAP is a free downloadable decompression program that utilizes unpadded bulhmanns decompression algorithm for mixed gas decompression.
Dealer Version New Gap Rgbm Rel Software Buhlmann Decompression Diveplanner Android Release Techdive Support Testimonials Info@gap Softwarecom Theapplication Downloads Instruction
3. Algorithm Recreation
1 Insult-o-Matic
Uses a
Uses a complex algorithm to generate classic, Shakespearean, and a variety of other insults.
Insults Insult Matic Pictures Evil Cookie Fortune Momma Pirate Shakespearean Yo Redneck Simple Funny Classic Obama Chain Natalie
Uses a complex algorithm to generate classic, Shakespearean, and a variety of other insults.
Insults Insult Matic Pictures Evil Cookie Fortune Momma Pirate Shakespearean Yo Redneck Simple Funny Classic Obama Chain Natalie
4. Computer & Algorithm Games Websites
1 Fast Line Drawing Algorithms by Po-Han Lin
Contains sources
Contains sources for graphical algorithms to draw lines. Included are the popular Bresenham algorithm, the Wus Symmetric Double-Step, and the fastest non-cpu dependent algorithm, the Extremely Fast Line Algorithm (EFLA).
Line Algorithm Fast Extremely Variation Efla Point Fixed Dda Po Han Maze Bresenham Source Generator
Contains sources for graphical algorithms to draw lines. Included are the popular Bresenham algorithm, the Wus Symmetric Double-Step, and the fastest non-cpu dependent algorithm, the Extremely Fast Line Algorithm (EFLA).
Line Algorithm Fast Extremely Variation Efla Point Fixed Dda Po Han Maze Bresenham Source Generator
2 The LBE Data Compression Algorithm
A Huffman
A Huffman like algorithm that uses triangular matrices, rather than binary trees, for string substitution. Free source code available.
Yahoo Geocities Cricket Help Groups Trying Local Longeravailable Termsreach Internet Legal Buzz Copyright
A Huffman like algorithm that uses triangular matrices, rather than binary trees, for string substitution. Free source code available.
Yahoo Geocities Cricket Help Groups Trying Local Longeravailable Termsreach Internet Legal Buzz Copyright
3 Postmans Sort
A linear
A linear time general purpose sorting algorithm. Included is a description of the algorithm and downloadable executables for Windows computers.
Development Software Product Ramey Engineering Design Robert Consulting Electronic Contact Services Circuit Personal New Manufacturing
A linear time general purpose sorting algorithm. Included is a description of the algorithm and downloadable executables for Windows computers.
Development Software Product Ramey Engineering Design Robert Consulting Electronic Contact Services Circuit Personal New Manufacturing
4 The Recursive Ray Tracing Algorithm
Explains how
Explains how the basic ray tracing algorithm with reflection, transparency and shadows works.
Yahoo Geocities Sign Help Policy Copyright Internet Reachsports Popular Machine Mail Sorry News Privacy
Explains how the basic ray tracing algorithm with reflection, transparency and shadows works.
Yahoo Geocities Sign Help Policy Copyright Internet Reachsports Popular Machine Mail Sorry News Privacy
5 Fortran Genetic Algorithm
Initializes a
Initializes a random sample of individuals with different parameters to be optimized using the genetic algorithm approach -- evolution via survival of the fittest. By David Carroll.
Information Error Services Setup Custom Open Page Directory Supportmicrosoft Manager Messageslinks Product Administrative
Initializes a random sample of individuals with different parameters to be optimized using the genetic algorithm approach -- evolution via survival of the fittest. By David Carroll.
Information Error Services Setup Custom Open Page Directory Supportmicrosoft Manager Messageslinks Product Administrative
6 ACOVEA (Analysis of Compiler Options via Evolutionary Algorithm)
ACOVEA (Analysis
ACOVEA (Analysis of Compiler Options via Evolutionary Algorithm) implements a genetic algorithm to the analysis of GNU C compiler optimization flags.
Request Nginxz
ACOVEA (Analysis of Compiler Options via Evolutionary Algorithm) implements a genetic algorithm to the analysis of GNU C compiler optimization flags.
Request Nginxz
7 Equicom, Inc. Unsupervised Data Clustering
Non-biological intelligence
Non-biological intelligence concept based on a matrix reasoning algorithm representing an intelligent data understanding system. The NBI-algorithm allows for unsupervised hierarchical multi-dimensional clustering based on hundreds of parameters.
Matrix Blog Nothing Perhaps |z Reasoningblogmenu Reasoning Found It
Non-biological intelligence concept based on a matrix reasoning algorithm representing an intelligent data understanding system. The NBI-algorithm allows for unsupervised hierarchical multi-dimensional clustering based on hundreds of parameters.
Matrix Blog Nothing Perhaps |z Reasoningblogmenu Reasoning Found It
8 Genetic and Evolutionary Algorithm Toolbox
[commercial]
[commercial]
Geatbx Matlab Evolutionary Algorithms Genetic Introduction Toolbox Evaluation Download Euros Main Examples Contact Optimization Algorithm Functions References Include
[commercial]
Geatbx Matlab Evolutionary Algorithms Genetic Introduction Toolbox Evaluation Download Euros Main Examples Contact Optimization Algorithm Functions References Include
9 iPageRank Forum
Discusses link
Discusses link popularity and Googles pagerank algorithm.
Z Wwwclasioneproboardscom Y
Discusses link popularity and Googles pagerank algorithm.
Z Wwwclasioneproboardscom Y
10 FileEncryptor
A small
A small and powerful freeware utility for encrypting files with the AES algorithm.
Z Y
A small and powerful freeware utility for encrypting files with the AES algorithm.
Z Y
11 HandyBits EasyCrypto
Creates self-extracting
Creates self-extracting, encrypted files through the use of the common Blowfish algorithm.
Z Y
Creates self-extracting, encrypted files through the use of the common Blowfish algorithm.
Z Y
12 Fingerprint Image Enhancement: Algorithm and Performance Evaluation
Trans. PAMI
Trans. PAMI, abstract.
Status Error Open Zedition Source Server Navigationshilfe Glassfish
Trans. PAMI, abstract.
Status Error Open Zedition Source Server Navigationshilfe Glassfish
13 Weekday
Fortran 77
Fortran 77 code to compute the day of the week of a date using the Zeller congruence algorithm.
Year Month Date Integer Dowdateformonday Given Test Cmonth Isthe Day Congruence Eg Computes
Fortran 77 code to compute the day of the week of a date using the Zeller congruence algorithm.
Year Month Date Integer Dowdateformonday Given Test Cmonth Isthe Day Congruence Eg Computes
14 Kakophone
Music online
Music online generator based on a dedicated algorithm can be used to generate ringtones.
Music Ringtone Kakophone Machine Free Composer Mobile Composition Midi Simply Game Movie Video Composing Download Combinations Polyphonic
Music online generator based on a dedicated algorithm can be used to generate ringtones.
Music Ringtone Kakophone Machine Free Composer Mobile Composition Midi Simply Game Movie Video Composing Download Combinations Polyphonic
15 QuickWiper
Windows file
Windows file wipe utility with NSA erasure algorithm, works with FAT16, FAT32 and NTFS.
Quickwiper Wiping System File Cleaner Wipe Windows Solutions Files Cannot Urls User Friendly Quickwiper’s Utility Free News Space
Windows file wipe utility with NSA erasure algorithm, works with FAT16, FAT32 and NTFS.
Quickwiper Wiping System File Cleaner Wipe Windows Solutions Files Cannot Urls User Friendly Quickwiper’s Utility Free News Space
16 EboBar
This is
This is a tool that catalogs all your documents and applications and makes them available through a few keypresses using a search algorithm that determines what you are trying to access.
Documentation Ebobar Hereclick Z
This is a tool that catalogs all your documents and applications and makes them available through a few keypresses using a search algorithm that determines what you are trying to access.
Documentation Ebobar Hereclick Z
17 QuickWiper
Windows file
Windows file wipe utility with NSA erasure algorithm, works with FAT16, FAT32 and NTFS.
Quickwiper Wiping System File Cleaner Wipe Solutions Cannot Windows Files User Friendly Free Solution Space Urls Screenshot
Windows file wipe utility with NSA erasure algorithm, works with FAT16, FAT32 and NTFS.
Quickwiper Wiping System File Cleaner Wipe Solutions Cannot Windows Files User Friendly Free Solution Space Urls Screenshot
18 VladimÃÂÂr Zábrodský
Extensive algorithm
Extensive algorithm collection. Also articles on the language, arithmetic operations and Rexx on AS/400.
Yahoo Geocities Policy Copyright Sign Help Inc Longeravailabletrying Sorry Maps Wayback Privacy Terms
Extensive algorithm collection. Also articles on the language, arithmetic operations and Rexx on AS/400.
Yahoo Geocities Policy Copyright Sign Help Inc Longeravailabletrying Sorry Maps Wayback Privacy Terms
19 Helion Technology
Offers a
Offers a range of data security silicon IP cores and provides DSP algorithm development and implementation.
Helion Aes Technology Encryption Asic Actel Altera Fpga Cores Lossless Compression Ip Xilinx Xts Gcm Products
Offers a range of data security silicon IP cores and provides DSP algorithm development and implementation.
Helion Aes Technology Encryption Asic Actel Altera Fpga Cores Lossless Compression Ip Xilinx Xts Gcm Products
20 The Algorithm Base
Database of
Database of algorithms. May be scanned through or can be questioned through a knowledge based assistant. Links to originating web sites.
Intelligenceunitedcom Goz Click Here
Database of algorithms. May be scanned through or can be questioned through a knowledge based assistant. Links to originating web sites.
Intelligenceunitedcom Goz Click Here
21 ALENEX 01
3rd Workshop
3rd Workshop on Algorithm Engineering and Experiments. Wyndham City Center Hotel, Washington, DC, USA, 5--6 January 2001.
Server Apache Permanently Theport Moved
3rd Workshop on Algorithm Engineering and Experiments. Wyndham City Center Hotel, Washington, DC, USA, 5--6 January 2001.
Server Apache Permanently Theport Moved
22 4t HIT Mail Privacy Lite
Sends and
Sends and receives private data hidden in images of various types by using a strong encrypting algorithm.
Mail Order Privacy Download List Wish Windows Email Support Tray Faq Minimizer Whats Features Hide Main
Sends and receives private data hidden in images of various types by using a strong encrypting algorithm.
Mail Order Privacy Download List Wish Windows Email Support Tray Faq Minimizer Whats Features Hide Main
23 V-Clip Collision Detection Library
An implementation
An implementation of the Lin-Canny algorithm for computing the distance between two closed polyhedra. Source available for noncommercial use.
Z Redirect Y
An implementation of the Lin-Canny algorithm for computing the distance between two closed polyhedra. Source available for noncommercial use.
Z Redirect Y
24 Salon.com: Meet Mr. Anti-Google
'A crusading
'A crusading webmaster says the popular search engines page-ranking algorithm is undemocratic.'
See Click Here Gray Sarah Prachi Gupta Abrams Lindsay Mcdonough Katie Richard Murphy Caryle Elias Elizabeth Daniel Ranking
'A crusading webmaster says the popular search engines page-ranking algorithm is undemocratic.'
See Click Here Gray Sarah Prachi Gupta Abrams Lindsay Mcdonough Katie Richard Murphy Caryle Elias Elizabeth Daniel Ranking
25 TachyonSpell
ActiveX spell-check
ActiveX spell-check component. Contains an English dictionary of 102,000 words, and uses 'Fuzzy Logic' for its suggestion matching algorithm. [Commercial]
Error Upgrade Server Dotnetnuke Could Version Verify Provider Namedpipes Assembly Thedatabase Doesz Match
ActiveX spell-check component. Contains an English dictionary of 102,000 words, and uses 'Fuzzy Logic' for its suggestion matching algorithm. [Commercial]
Error Upgrade Server Dotnetnuke Could Version Verify Provider Namedpipes Assembly Thedatabase Doesz Match
26 NoteSafe
Text editor
Text editor to work with files that have been encrypted on the hard drive. Program uses the TwoFish encryption algorithm to scramble the information.
Mct Inc Yourbrowserbrowser Does Support Recommend Click Mctservice Upgradinghere
Text editor to work with files that have been encrypted on the hard drive. Program uses the TwoFish encryption algorithm to scramble the information.
Mct Inc Yourbrowserbrowser Does Support Recommend Click Mctservice Upgradinghere
27 Graphics Interchange Format
Provides detailed
Provides detailed specification of file layout, encoding and decoding algorithm, and color space model for gif89a.
Eggnog Gif Simple Recipecsource Legal Fields Data Server Brainteasers Example Android Great Magic
Provides detailed specification of file layout, encoding and decoding algorithm, and color space model for gif89a.
Eggnog Gif Simple Recipecsource Legal Fields Data Server Brainteasers Example Android Great Magic
28 C++ vs. Java vs. Python vs. Ruby: A First Impression
Essay compares
Essay compares aspects of the languages, one page allows matched comparing of code of a red-black tree algorithm in each language.
Paul Finden Tipps Registrierung Ich Zoomtrader Junker Soll Gestellte Wo Häufig Anfangen Wähletricks
Essay compares aspects of the languages, one page allows matched comparing of code of a red-black tree algorithm in each language.
Paul Finden Tipps Registrierung Ich Zoomtrader Junker Soll Gestellte Wo Häufig Anfangen Wähletricks
29 Relona
A division
A division of Coroman Systems, Inc., which has developed a self-correcting search algorithm and a presentation of results that combines searching and browsing. Explains the technology and its benefits.
Relona Relonas Contact News Patent Terms Patented Android Licensing Contact Your Internationalcareers Patents India
A division of Coroman Systems, Inc., which has developed a self-correcting search algorithm and a presentation of results that combines searching and browsing. Explains the technology and its benefits.
Relona Relonas Contact News Patent Terms Patented Android Licensing Contact Your Internationalcareers Patents India
30 Chips and Technologies of Intel Corporation
HiQColor algorithm
HiQColor algorithm provides enhanced color fidelity for a wide range of active and passive flat panel displays.
English Español Intel® Intel United اÙ„عربÙÃ…Â Ø© Hardware اللغة Processor Indonesia Emirates Arabia Xeon® East Arab Australia Poland Egypt Russia
HiQColor algorithm provides enhanced color fidelity for a wide range of active and passive flat panel displays.
English Español Intel® Intel United اÙ„عربÙÃ…Â Ø© Hardware اللغة Processor Indonesia Emirates Arabia Xeon® East Arab Australia Poland Egypt Russia
31 Vinokur, Alex
Huffman Coding
Huffman Coding (including n-ary Huffman Template Algorithm). At Tadiran Scopus.
Template Math Algorithms Huffman Alex Vinokur Computer Sci Comp Function People Page Fibonacci Class Compression Free Web Instead Around
Huffman Coding (including n-ary Huffman Template Algorithm). At Tadiran Scopus.
Template Math Algorithms Huffman Alex Vinokur Computer Sci Comp Function People Page Fibonacci Class Compression Free Web Instead Around
32 Vinokur, Alex
Huffman Coding
Huffman Coding (including n-ary Huffman Template Algorithm). At Tadiran Scopus.
Template Math Algorithms Computer Huffman Vinokur Alex Comp Function People Sci Page Fibonacci Compression Class Tree Graph Discussions Functions Poetry Postings State Software
Huffman Coding (including n-ary Huffman Template Algorithm). At Tadiran Scopus.
Template Math Algorithms Computer Huffman Vinokur Alex Comp Function People Sci Page Fibonacci Compression Class Tree Graph Discussions Functions Poetry Postings State Software
33 Outlook Spam Filter
Uses Bayesian
Uses Bayesian algorithm, friends lists and customizable keywords to filter your e-mail.
Spam Free Email Anti Webmail Antispam Help Equat Eaflets Eaflet Filter Software Filters Imap Messaging Inspector
Uses Bayesian algorithm, friends lists and customizable keywords to filter your e-mail.
Spam Free Email Anti Webmail Antispam Help Equat Eaflets Eaflet Filter Software Filters Imap Messaging Inspector
34 Vertexemarketing
Optimizes web
Optimizes web pages according to search engine algorithm and rank websites in all major search engines.
Submission Optimization Engine Pakistan Managing Seo Promotion Website Karachi Form Inquriy Placement Tools Yahoo Manual Advance Clients
Optimizes web pages according to search engine algorithm and rank websites in all major search engines.
Submission Optimization Engine Pakistan Managing Seo Promotion Website Karachi Form Inquriy Placement Tools Yahoo Manual Advance Clients
35 TrueColorToPalette
Convert true
Convert true color images to paletted images using Floyd-Steinberg dithering algorithm.
Foundaspnetpalette Nothing Browse Searchpages * Z
Convert true color images to paletted images using Floyd-Steinberg dithering algorithm.
Foundaspnetpalette Nothing Browse Searchpages * Z
36 How Much Does iTunes Like My Five-Star Songs?
Article explores
Article explores the algorithm iTunes uses to pick what comes next in a Party Shuffle playlist.
Found Filevisit Omninerdpage Submit
Article explores the algorithm iTunes uses to pick what comes next in a Party Shuffle playlist.
Found Filevisit Omninerdpage Submit
37 US4558302 Patent
The US
The US patent covering the LZW compression algorithm used in GIF images.
References Show Hm Other Data Title File High Status Abstract Method Family Decompression Speed Inpadoc Report Claims Gf
The US patent covering the LZW compression algorithm used in GIF images.
References Show Hm Other Data Title File High Status Abstract Method Family Decompression Speed Inpadoc Report Claims Gf
38 PGP Technical Algorithm Comparison
A comprehensive
A comprehensive technical article on various algorithms used by PGP.
Z Y
A comprehensive technical article on various algorithms used by PGP.
Z Y
39 Neurotechnologija
AFIS, fingerprint
AFIS, fingerprint and face recognition as SDK or source code with full algorithm. Technology details, download, and ordering information. Based in Vilnius, Lithuania.
Sdk Licensing Prices Megamatcher Sentisight Sdks Verilook Fingerprint Iris Embedded Card Product Face Accelerator Surveillance Ncheck Accurate
AFIS, fingerprint and face recognition as SDK or source code with full algorithm. Technology details, download, and ordering information. Based in Vilnius, Lithuania.
Sdk Licensing Prices Megamatcher Sentisight Sdks Verilook Fingerprint Iris Embedded Card Product Face Accelerator Surveillance Ncheck Accurate
40 Juicy Studio: Colour Contrast Analyser
Uses the
Uses the W3C algorithm to check for sufficient contrast between background and foreground colours.
Contrast Ratio Quality Assurancewcag Statement Archive Contact Criterion Juicy Privacy Content Colour High
Uses the W3C algorithm to check for sufficient contrast between background and foreground colours.
Contrast Ratio Quality Assurancewcag Statement Archive Contact Criterion Juicy Privacy Content Colour High
41 Netadelica Genetic Algorithms
A brief
A brief experiment in coding a simple genetic algorithm bit counter that compares different evolution parameters.
Crossover Graph Mutation Each Genetic Algorithms Netadelica Value Selection Fitness Table Bit Evolution Point Parameters Graphs Algorithm Weve
A brief experiment in coding a simple genetic algorithm bit counter that compares different evolution parameters.
Crossover Graph Mutation Each Genetic Algorithms Netadelica Value Selection Fitness Table Bit Evolution Point Parameters Graphs Algorithm Weve
42 Distributed Chess
Project attempts
Project attempts to create chess-playing neural networks via a genetic algorithm. Screensaver for Win95, Win98.
Project attempts to create chess-playing neural networks via a genetic algorithm. Screensaver for Win95, Win98.
43 FileGuardian
Software that
Software that uses a 128 bit key for the Advanced Encryption Standard (Rijndael encryption algorithm) to protect sensitive files from unwanted viewing. [Windows 98/Me/NT/2000/XP]
Navigationshilfey
Software that uses a 128 bit key for the Advanced Encryption Standard (Rijndael encryption algorithm) to protect sensitive files from unwanted viewing. [Windows 98/Me/NT/2000/XP]
Navigationshilfey
44 Computing the Distance between Objects
An implementation
An implementation of the Gilbert, Johnson, and Keerthi (GJK) algorithm for tracking the distance between a pair of convex polyhedra. Source available for nonprofit use.
Portserver Permanently The Apache Z
An implementation of the Gilbert, Johnson, and Keerthi (GJK) algorithm for tracking the distance between a pair of convex polyhedra. Source available for nonprofit use.
Portserver Permanently The Apache Z
45 NetProfit: Googles Florida Update: One Month Later
Gord Hotchkiss
Gord Hotchkiss of Search Engine Positioning looks at Googles new algorithm and reactions to it. Includes the possible use of Applied Semantics.
Apache Permanently The Server Portz
Gord Hotchkiss of Search Engine Positioning looks at Googles new algorithm and reactions to it. Includes the possible use of Applied Semantics.
Apache Permanently The Server Portz
46 Genetic and Evolutionary Algorithm Toolbox
GEATbx is
GEATbx is a comprehensive implementation of evolutionary algorithms in Matlab. A broad range of operators is fully integrated into one environment.
Geatbx Matlab Evolutionary Algorithms Genetic Toolbox Introduction Evaluation Download Optimization Prices Algorithm Main Examples Euros Evolution
GEATbx is a comprehensive implementation of evolutionary algorithms in Matlab. A broad range of operators is fully integrated into one environment.
Geatbx Matlab Evolutionary Algorithms Genetic Toolbox Introduction Evaluation Download Optimization Prices Algorithm Main Examples Euros Evolution
47 Bayesian Knowledge Discoverer
Able to
Able to learn Bayesian Belief Networks from (possibly incomplete) databases. Algorithm based on the Bound and Collapse estimation method.
Bayeswarecom Advance Cash Insurance Debt Consolidation Phones Domain Terms Free Browselearn Best Credit
Able to learn Bayesian Belief Networks from (possibly incomplete) databases. Algorithm based on the Bound and Collapse estimation method.
Bayeswarecom Advance Cash Insurance Debt Consolidation Phones Domain Terms Free Browselearn Best Credit
48 ai-junkie.com
Genetic Algorithm
Genetic Algorithm and Neural Network tutorials. All tutorials are supported with well commented source code. There is also a discussion forum where readers may discuss anything AI related.
Z Welcome Y
Genetic Algorithm and Neural Network tutorials. All tutorials are supported with well commented source code. There is also a discussion forum where readers may discuss anything AI related.
Z Welcome Y
49 Absolute GIF Optimizer
Easily optimize
Easily optimize your GIF images for displaying on your Web site, uses an efficient, non-destructive algorithm to optimize and includes drag-and-drop capability. [Win 95/98/Me/NT/2000]
Z Y
Easily optimize your GIF images for displaying on your Web site, uses an efficient, non-destructive algorithm to optimize and includes drag-and-drop capability. [Win 95/98/Me/NT/2000]
Z Y
50 CudenDB
Java Object
Java Object Database. It have simple interface like: store, get, delete, and query. BTree algorithm is used for storing and searching. Indexes to allow for fast search. Transactions: beginTransactions, endTransactions, commit, and rollback.
Yahoo Geocities Help Sign Policy Copyright Internet Toolbar Longeravailable Archiveorg Inc Maps Popular Sites Terms
Java Object Database. It have simple interface like: store, get, delete, and query. BTree algorithm is used for storing and searching. Indexes to allow for fast search. Transactions: beginTransactions, endTransactions, commit, and rollback.
Yahoo Geocities Help Sign Policy Copyright Internet Toolbar Longeravailable Archiveorg Inc Maps Popular Sites Terms
51 THBRegIni
A set
A set of COM components allowing to access and modify the Windows Registry and Ini-Files. It integrates the AES strong encryption algorithm supporting 128, 192, 256bit encryption keys. By THBComponentware. [Commercial]
Z Y
A set of COM components allowing to access and modify the Windows Registry and Ini-Files. It integrates the AES strong encryption algorithm supporting 128, 192, 256bit encryption keys. By THBComponentware. [Commercial]
Z Y
52 NeuroDimension Inc: Genetic Algorithm Software
Use NeuroDimensions
Use NeuroDimensions Genetic Server or Genetic Library products to embed genetic algorithms into your own VB/C++ application.
Neural Neurosolutions Network Software Tradingsolutions Trader Course Networks Infinity Services Consulting Library Optigen Download Book Distributed Tradercom Advanced System
Use NeuroDimensions Genetic Server or Genetic Library products to embed genetic algorithms into your own VB/C++ application.
Neural Neurosolutions Network Software Tradingsolutions Trader Course Networks Infinity Services Consulting Library Optigen Download Book Distributed Tradercom Advanced System
53 Vianix Corporation
Developed MASC
Developed MASC technology (Managed Audio Sound Compression) memory-efficient audio compression algorithm providing voice emulation.
ã‚Âャッシング 誰もãŒ知ã£ã¦るã‚Âャッシングã®アコムãÂŒåˆÂã‚Âã¦ã®人ã‹ら評価ã•れるç†çâ€Â± 無利æ¯ ã¿んãªã¯ã„ã£ãŸã„何ã«使ã£ã¦る?ã¿んãªã®å¦çâ€Å¸Ã£Æ’Âーンã®使ã„é“を大検証 サイトマップ 便利ã™ãÂŽã‚‹ã‚Âャッシングã®Ã
Developed MASC technology (Managed Audio Sound Compression) memory-efficient audio compression algorithm providing voice emulation.
ã‚Âャッシング 誰もãŒ知ã£ã¦るã‚Âャッシングã®アコムãÂŒåˆÂã‚Âã¦ã®人ã‹ら評価ã•れるç†çâ€Â± 無利æ¯ ã¿んãªã¯ã„ã£ãŸã„何ã«使ã£ã¦る?ã¿んãªã®å¦çâ€Å¸Ã£Æ’Âーンã®使ã„é“を大検証 サイトマップ 便利ã™ãÂŽã‚‹ã‚Âャッシングã®Ã
54 Efficient text searching in Java: Finding the right string in any language
Detailed, clearly-written
Detailed, clearly-written tutorial from IBM on internationalized searching algorithms. Includes code snippets and an i18n Boyer-Moore algorithm which requires JDK1.2.
Navigationshilfe Ty
Detailed, clearly-written tutorial from IBM on internationalized searching algorithms. Includes code snippets and an i18n Boyer-Moore algorithm which requires JDK1.2.
Navigationshilfe Ty
55 k-means clustering tutorial
Introduction to
Introduction to k-means clustering, a popular data mining and unsupervised learning algorithm. Free code, software, resources and examples are available for download.
Mean Clustering Distance Tutorial Analysis Excel Learning Means System Rank Kardi Download Code Number Data Tutorials Macro Here Google+
Introduction to k-means clustering, a popular data mining and unsupervised learning algorithm. Free code, software, resources and examples are available for download.
Mean Clustering Distance Tutorial Analysis Excel Learning Means System Rank Kardi Download Code Number Data Tutorials Macro Here Google+
56 Crypto 2000
Simply drag-and-drop
Simply drag-and-drop files and folders to protect sensitive documents, and then enter an encryption key to encode, and decode the files. It uses the BlowFish encryption algorithm.
Crypto Windows Gregory Software Braun Design Bytes Shot Cryptozip Encryption Crypto_setupexe Screen Utility Free Download Click Registration Computer
Simply drag-and-drop files and folders to protect sensitive documents, and then enter an encryption key to encode, and decode the files. It uses the BlowFish encryption algorithm.
Crypto Windows Gregory Software Braun Design Bytes Shot Cryptozip Encryption Crypto_setupexe Screen Utility Free Download Click Registration Computer
57 Compression via Arithmetic Coding in Java
Unrestricted open-source
Unrestricted open-source Java implementation of the PPM (prediction by partial matching) algorithm for text and data compression by Bob Carpenter. Builds with ant.
Java Version Arithmetic Coding Javadoc Results Compression Source Comcolloquialarithcode Hotspot Windows Carpenter Suns Quantify Jar
Unrestricted open-source Java implementation of the PPM (prediction by partial matching) algorithm for text and data compression by Bob Carpenter. Builds with ant.
Java Version Arithmetic Coding Javadoc Results Compression Source Comcolloquialarithcode Hotspot Windows Carpenter Suns Quantify Jar
58 Sparse Matrix Compression Schemes
Pseudocode for
Pseudocode for a spare matrix compression algorithm.
T[i][j] Compression Sparse Schemes Table Used Graph Matrices Row Optimizing Elimination Parser Ivebernie
Pseudocode for a spare matrix compression algorithm.
T[i][j] Compression Sparse Schemes Table Used Graph Matrices Row Optimizing Elimination Parser Ivebernie
59 Understanding SoundEx Algorithms
Article describing
Article describing and discussing the SoundEx searching algorithm and enhancements to make it more accurate. Includes SoundEx conversion form and Open licensed source code in C, JavaScript, and Perl.
Wordstr Soundex Replacewordstr Inc [top] Creativyst Then Soundexlen Change Firstletter Javascript Perl Software Code Censusoption Algorithm
Article describing and discussing the SoundEx searching algorithm and enhancements to make it more accurate. Includes SoundEx conversion form and Open licensed source code in C, JavaScript, and Perl.
Wordstr Soundex Replacewordstr Inc [top] Creativyst Then Soundexlen Change Firstletter Javascript Perl Software Code Censusoption Algorithm
60 Artificial Life on the Web
A web-oriented
A web-oriented artificial-life site: Alife, genetic-algorithm and cellular-automata experiments written in cross-platform web languages (Java, tcl/tk), with free source code.
Object Version Error Aspfooter_ascx__render__controlhtmltextwriter Stack Boolean Note Versionaspnet Application Please Reference Runningtrace
A web-oriented artificial-life site: Alife, genetic-algorithm and cellular-automata experiments written in cross-platform web languages (Java, tcl/tk), with free source code.
Object Version Error Aspfooter_ascx__render__controlhtmltextwriter Stack Boolean Note Versionaspnet Application Please Reference Runningtrace
61 Extract Link
Remove links
Remove links or URLs (email, http, ftp, news) from any type of file (Html, Word, Excel, executables, ZIP/Acrhive). Accurate, fast threaded search algorithm, works also as Link / URL Extractor. [Windows 95/98/2000/NT/ME/XP]
Extractor Email Extract Link Extraction Support Advanced Software Option Url File Mail Word Excel Offline Threaded
Remove links or URLs (email, http, ftp, news) from any type of file (Html, Word, Excel, executables, ZIP/Acrhive). Accurate, fast threaded search algorithm, works also as Link / URL Extractor. [Windows 95/98/2000/NT/ME/XP]
Extractor Email Extract Link Extraction Support Advanced Software Option Url File Mail Word Excel Offline Threaded
62 Vasus Fractal Dimension
You can
You can download a free fractal screen saver for Windows environment. 2 dimensional figures developed using String systems algorithm (L-systems) are depicted in random, by topic or in proper order.
Yahoo Geocities Copyright Help Policy Sign Internet Popular Sites Mapsfinance Sorry Movies Reach Sports
You can download a free fractal screen saver for Windows environment. 2 dimensional figures developed using String systems algorithm (L-systems) are depicted in random, by topic or in proper order.
Yahoo Geocities Copyright Help Policy Sign Internet Popular Sites Mapsfinance Sorry Movies Reach Sports
63 LEDA
Library of
Library of Efficient Data types and Algorithms. Has all relevant algorithm building blocks in easy-to-use, efficient form for objects such as graphs, sequences, dictionaries, trees, points, flows, matchings, segments, shortest paths. [Algorithmic Solutions Software GmbH]
Software Types Data Solutions Algorithms Efficient Structures Leda Networks Development Algorithmic Network Algorithmic Graphs User Compression Isomorphisms
Library of Efficient Data types and Algorithms. Has all relevant algorithm building blocks in easy-to-use, efficient form for objects such as graphs, sequences, dictionaries, trees, points, flows, matchings, segments, shortest paths. [Algorithmic Solutions Software GmbH]
Software Types Data Solutions Algorithms Efficient Structures Leda Networks Development Algorithmic Network Algorithmic Graphs User Compression Isomorphisms
64 Intelligent Coordinates and Collective Intelligence Research
Research page
Research page by Chris Mattmann, USC graduate student, regarding a project that extends the work of D. Wolpert and K. Tumer on a hybrid search algorithm (Intelligent Coordinates)
Research page by Chris Mattmann, USC graduate student, regarding a project that extends the work of D. Wolpert and K. Tumer on a hybrid search algorithm (Intelligent Coordinates)
65 FastSum
File verification
File verification tool based on MD5 checksum algorithm, with two interfaces and a free edition. Includes tool for creation and verification of data fingerprints, damage detection and file comparison. [Windows 98MeNT2000XP]
Md Checksum Fastsum Windows Edition Standard Wizard Tagtuner Checker Wizards Hash Verification Handy Sound Download Lm
File verification tool based on MD5 checksum algorithm, with two interfaces and a free edition. Includes tool for creation and verification of data fingerprints, damage detection and file comparison. [Windows 98MeNT2000XP]
Md Checksum Fastsum Windows Edition Standard Wizard Tagtuner Checker Wizards Hash Verification Handy Sound Download Lm
66 MemoKit
Computer memory
Computer memory optimizer and performance booster with a memory and cache optimizer, and a memory and resource leak analyzer. It uses algorithm for PC memory optimization and recovery, which provides PCs fast response even in memory overload conditions. For Windows 95/98/Me/2000/NT.
Centos Apache Centosproject Operating Test Enterprise System Public The Theowner Website Server Linuxpowered General Note Centos Centosorg
Computer memory optimizer and performance booster with a memory and cache optimizer, and a memory and resource leak analyzer. It uses algorithm for PC memory optimization and recovery, which provides PCs fast response even in memory overload conditions. For Windows 95/98/Me/2000/NT.
Centos Apache Centosproject Operating Test Enterprise System Public The Theowner Website Server Linuxpowered General Note Centos Centosorg
67 Routing Number Validator
Routing Checker
Routing Checker 1.0 validates the routing number on U.S. Checks by measuring them against an algorithm. Helps prevent returned checks due to type-os, errors and fraud. [Windows 95/98/ME]
Apachepermanently The Opensslamod_auth_passthrough Serveratfrontpage Port
Routing Checker 1.0 validates the routing number on U.S. Checks by measuring them against an algorithm. Helps prevent returned checks due to type-os, errors and fraud. [Windows 95/98/ME]
Apachepermanently The Opensslamod_auth_passthrough Serveratfrontpage Port
68 Demo Fortran90 Multilayer Perceptron Backprop Code
By Phil
By Phil Brierley. A genetic algorithm code is at http://www.philbrierley.com/main.html&code/gafortran.html&code/codeleft.html .
Data Neural Network Software Mining Mlp Brierley Shareware Networks Perceptron Phil Tiberius Multilayer
By Phil Brierley. A genetic algorithm code is at http://www.philbrierley.com/main.html&code/gafortran.html&code/codeleft.html .
Data Neural Network Software Mining Mlp Brierley Shareware Networks Perceptron Phil Tiberius Multilayer
69 Classification Tree in Excel
A small
A small Excel based freeware to build Classification Tree models in Excel. Uses C4.5 algorithm. Very easy to learn and use - but capability is limited.
Yahoo Geocities Copyright Policy Help Sign Sports Privacymachine Longeravailable Reach Movies Archiveorg Sites
A small Excel based freeware to build Classification Tree models in Excel. Uses C4.5 algorithm. Very easy to learn and use - but capability is limited.
Yahoo Geocities Copyright Policy Help Sign Sports Privacymachine Longeravailable Reach Movies Archiveorg Sites
70 Top Secret Crypto Gold
An e-mail
An e-mail and file encryption program that uses the RSA Public Key Encryption Algorithm, with a key space, or Modulus n size, of 480 to 16,384 bits. Three conventional encryption algorithms with a key space up to 20,129 bits. [Win95/98/Me/NT/2000/XP]
Bitcoin Atms Silk Road First Cryptocoin Auction Cryptocurrency Crypto News Coin College Currency Million Secret Angeles Month Scenario Coinbase
An e-mail and file encryption program that uses the RSA Public Key Encryption Algorithm, with a key space, or Modulus n size, of 480 to 16,384 bits. Three conventional encryption algorithms with a key space up to 20,129 bits. [Win95/98/Me/NT/2000/XP]
Bitcoin Atms Silk Road First Cryptocoin Auction Cryptocurrency Crypto News Coin College Currency Million Secret Angeles Month Scenario Coinbase
71 Artificial Life and Other Experiments
Artificial life
Artificial life and genetic algorithm experiments in java and tcl with free source code, 3D doll pictures and web design experiments.
Object Version Error Url Stack Boolean Information Running Please Aspfooter_ascx__render__controlhtmltextwriter Applicationexception Microsoft Exampleor
Artificial life and genetic algorithm experiments in java and tcl with free source code, 3D doll pictures and web design experiments.
Object Version Error Url Stack Boolean Information Running Please Aspfooter_ascx__render__controlhtmltextwriter Applicationexception Microsoft Exampleor
72 Automatic Email Processing Tool
Software for
Software for processing incoming E-mail messages. AEP is helpful to build automatic order form processing systems or intellectual answering machines. User-friendly visual editor and tools for debugging processing algorithm.
Request Emexnginxsupport Download Found Order Expand Collapse Http
Software for processing incoming E-mail messages. AEP is helpful to build automatic order form processing systems or intellectual answering machines. User-friendly visual editor and tools for debugging processing algorithm.
Request Emexnginxsupport Download Found Order Expand Collapse Http
73 Experimental and Agent-Based Computational Economics
Fortran 77
Fortran 77 programs for the Repulsive Particle Swarm, Differential Evolution, Real coded Genetic Algorithm, Simulated Annealing, and Generalized Simulated Annealing methods. Code for fittting the logarithmic spiral and for the Maximum Entropy Leuven Estimator for Multicollinearity.
Fortran 77 programs for the Repulsive Particle Swarm, Differential Evolution, Real coded Genetic Algorithm, Simulated Annealing, and Generalized Simulated Annealing methods. Code for fittting the logarithmic spiral and for the Maximum Entropy Leuven Estimator for Multicollinearity.
74 Face Detection and Face Recognition
Face detection
Face detection and recognition software project includes an online demo of the algorithm, links to free software libraries, and a list of existing facial databases.
Betaface Demos Products Gallery Contact Advanced Terms Uncategorized Software Face Followon Recognition | Use Feedlatest Unique Fox Bae
Face detection and recognition software project includes an online demo of the algorithm, links to free software libraries, and a list of existing facial databases.
Betaface Demos Products Gallery Contact Advanced Terms Uncategorized Software Face Followon Recognition | Use Feedlatest Unique Fox Bae
75 Teutoburgo - JaVi (Java Vigenere) Applet
Contains an
Contains an open source Java Applet called JaVi (Java Vigenere, Vigenere is an algorithm for cryptography). Includes manual (including UML diagrams and Javadoc documentation) and standalone version.
Yahoo Geocities Finanza Famosi Tutti Answers Inc Linee Siti Mailaiuto Condizioni Wayback Flickr
Contains an open source Java Applet called JaVi (Java Vigenere, Vigenere is an algorithm for cryptography). Includes manual (including UML diagrams and Javadoc documentation) and standalone version.
Yahoo Geocities Finanza Famosi Tutti Answers Inc Linee Siti Mailaiuto Condizioni Wayback Flickr
76 Garbage Collection: Automatic Memory Management in the Microsoft .NET Framework
Explains how
Explains how resources are allocated and managed, then gives a description of how the garbage collection algorithm works. Also discussed are the way resources can clean up properly when the garbage collector decides to free a resources memory and how to force an object to clean up when it is freed. By Jeffrey Richter, MSDN Magazine.
Z Collection Magazine Request Memory Net Error Management Msdn Frameworkautomatic Garbage Microsoft
Explains how resources are allocated and managed, then gives a description of how the garbage collection algorithm works. Also discussed are the way resources can clean up properly when the garbage collector decides to free a resources memory and how to force an object to clean up when it is freed. By Jeffrey Richter, MSDN Magazine.
Z Collection Magazine Request Memory Net Error Management Msdn Frameworkautomatic Garbage Microsoft
5. Sports Websites concerning Algorithm
6. Society, Arts and Algorithm Crafts
1 Crypto-Gram: Voting and Technology
Skeptical article
Skeptical article about computerized voting by inventor of the Blowfish cryptography algorithm. Lots of good links to other articles.
Httpwwwschneiercom Crypto Security News Html Httpwwwcounterpanecom Gram Books Httpwwwwiredcomnewspolitics Blog Essays Httpwwwzdnetcomzdnnstoriesnews Httpwwwsfgatecomcgi Binarticlecgifile= Httpwwwtheregistercoukcontenthtml Terrorists Httpwwwbostoncomdailynewseconomy Ibms Movie Httpwwwnwfusioncomnewstechtechhtml Httpwwwcnncomtechcomputing
Skeptical article about computerized voting by inventor of the Blowfish cryptography algorithm. Lots of good links to other articles.
Httpwwwschneiercom Crypto Security News Html Httpwwwcounterpanecom Gram Books Httpwwwwiredcomnewspolitics Blog Essays Httpwwwzdnetcomzdnnstoriesnews Httpwwwsfgatecomcgi Binarticlecgifile= Httpwwwtheregistercoukcontenthtml Terrorists Httpwwwbostoncomdailynewseconomy Ibms Movie Httpwwwnwfusioncomnewstechtechhtml Httpwwwcnncomtechcomputing
2 Algorithm: Rapid Approach to Ethical Problems
How should
How should clinicians approach an ethical dilemma when they have little time to ponder or to seek consultation? This proven method works.
Ethics Ethical Press Galen Approach Rapid Test Medicine Extras Books Problems Medical Emergency Specials List Tucson Join Childrens Impartiality
How should clinicians approach an ethical dilemma when they have little time to ponder or to seek consultation? This proven method works.
Ethics Ethical Press Galen Approach Rapid Test Medicine Extras Books Problems Medical Emergency Specials List Tucson Join Childrens Impartiality
3 Surname to Soundex Calculator
An online
An online surname to soundex converter utility based on the US archive standards. Includes an explanation of the soundex algorithm and soundex limitations.
Viewmore Business Started Small Yahoo Now Hosting Email Terms Domains Website Account Aabaco Please Help Customer
An online surname to soundex converter utility based on the US archive standards. Includes an explanation of the soundex algorithm and soundex limitations.
Viewmore Business Started Small Yahoo Now Hosting Email Terms Domains Website Account Aabaco Please Help Customer
1 the solitaire encryption algorithm
explanation and
explanation and source code for the crypto system used in cryptonomicon.
Services Security Bt Management Assure Network Professional Business Contact Managed Talk Mobility Access Lines Virtual End
explanation and source code for the crypto system used in cryptonomicon.
Services Security Bt Management Assure Network Professional Business Contact Managed Talk Mobility Access Lines Virtual End
Algorithm Dictionary
algorithm / algorithmic rule / algorithmic program: a precise rule (or set of rules) specifying how to solve some problemsorting algorithm: an algorithm for sorting a list
stemmer / stemming algorithm: an algorithm for removing inflectional and derivational endings in order to reduce word forms to a common stem
algorithm error: error resulting from the choice of the wrong algorithm or method for achieving the intended result
SiteBook.org Reviews for Algorithm. The business hours may vary on holidays like Memorial Day, Independence Day and Labor Day, Columbus Day, Veterans Day and Thanksgiving Day - Statistics: 3 SiteBook Points for "Algorithm" (visitors of this topic page). Algorithm › Reviews & Experience Experience and Review Algorithm Opening Times and Reports. Date:
Our Recommendations:
In mathematics and computer science, an algorithm is a self-contained step-by-step set of operations to be performed. Algorithms exist that perform calculation, data processing, and automated reasoning.
2 results for Algorithm: Software Z Yahoo Download Help Y Click Contact Terms Geocities Free Here