CallerList is a Web based call screening application. It consists of two pages: a data entry page for the call screener and a read-only page for the cast and crew. Note that the font is intentionally large so that the host is able to see the list of callers from a distance. CallerList works with most modern browsers.
iSAM is an optimization library for sparse nonlinear problems as encountered in simultaneous localization and mapping (SLAM) in mobile robotics. The iSAM library provides efficient algorithms for batch and incremental optimization, recovering the exact least-squares solution. The library can easily be extended to new problems, and functionality for often encountered 2D and 3D SLAM problems is already provided.
PhotoRescue will undelete, unerase, and recover pictures, images, and files lost on corrupted, erased, or damaged compact flash, smartmedia, memory sticks, mmd, XD, multimedia, or secure digital memory cards when other solutions fail. It supports the recovery of all file types, but its algorithms are particularly optimized for JPEG files, TIFF files, GIFs, and BMPs. It also offers constantly updated support for CRW, NEF, ORF, MRW, and many types of movie files. In some cases, it can even rebuild pictures that have suffered minor corruptions. It deals with cases where the media is not visible as a drive letter anymore. The unique unfragmenting technology rebuilds cherished memories that would otherwise have been lost forever.
STM Lib is a pragmatic library implementation of software transactional memory (STM) for Java and other JVM languages (such as Scala, Clojure, and Groovy). STM is ideal for applications where data is accessed concurrently by several threads and doesn't have to be persisted in real-time. For example, chat or instant messaging servers, file sharing servers, real time search engines, and massively multiplayer online games or virtual communities. It also works for all kinds of multithreaded programs. STMlib provides transactional collection classes that implement the standard Java APIs. The locking scheme is based on 2 phase locking, which enforces Serializability. Also, transactions are automatically retried when deadlocks occur, so you don't have to.