Accountability Pal monitors your network and keeps track of who is using the Internet and what they are viewing, downloading, uploading, etc. It emails a report of each user's activity to the person/people you specify. It will monitor HTTP traffic, Peer-to-Peer, FTP, and more. It uses a plugin interface to allow others to easily add new protocols to its monitoring abilities.
Acogc is a simple garbage collector. It can coexist with other allocation strategies, as it is implemented on top of malloc/free. It uses a stop-and-copy algorithm. Its main goal is to be small and embeddable, not to be fast. It provides accurate cooperative collection, so the user has to supply custom marker functions for objects and must tag references on the stack manually. Swept objects are not destroyed, but are pooled in a free-queue and for faster reallocation. Weak references to swept objects can reinstantiate the object.
ACOPOST is a set of freely available POS taggers modeled after well-known techniques. The programs are written in C (aiming for extreme portability and code correctness/safety) and run under various Unix flavors (and probably even under Windows). ACOPOST currently consists of four taggers that are based on different frameworks: Maximum Entropy Tagger (MET), Trigram Tagger (T3, based on Hidden Markov Models), Error-driven Transformation-based Tagger (TBT or Brill Tagger), and Example-based tagger (ET).
ABISS (Active Block I/O Scheduling System) is an extension for the Linux kernel that implements priorities for disk IO operations, and that provides a means for applications to use these priorities to obtain real-time (e.g. a guaranteed data rate) and prioritized best-effort services. The kernel code is supported by a user space daemon and a library.
Active port forwarder uses SSL for secure packet tunneling. It is designed for people without an external IP who want to make some services available on the Internet. afserver is placed on the machine with a publicly accessible address, and afclient is placed on the machine behind a firewall or masquerade. This makes the second machine visible to the Internet. Running afserver does not require root priviledges, nor does it use other processes. Zlib is used to compress the transferred data.