The Atropos (formerly AVNMP) Toolkit allows experimentation with predictive capability inside a network while the network is operating: this might be best described as 'in vitro' prediction experimentation. Its purpose is to facilitate experimentation towards addressing a severe limitation in state-of-the-art network management: current management techniques are reactive. The toolkit is an active application that executes in real time within a network that has an overlay active network. Active networking provides a framework in which executable code within data packets executes upon intermediate network nodes. The Atropos Toolkit provides the infrastructure to develop and inject numerous, small, interacting network component models in support of network prediction. Research results in Complexity Theory using Atropos can be found in the DARPA-funded GE Fault Tolerant Networking Project.
SIMD Viterbi Decoder provides library functions to decode certain popular error correction codes. This version supports two codes: a rate 1/2, constraint length 7 (r=1/2, k=7) code, and an r=1/2, k=9 code. Four implementations of each decoder are provided. One is in portable C and should run in any GNU C environment. The other three use the IA32 SIMD (single instruction, multiple data) instruction sets: MMX, SSE, and SSE2. The SSE version of the k=7 decoder executes at ~9 megabits/sec on a 1GHz Pentium-III.
DSP implements several low-level digital signal processing (DSP) primitives accelerated, when available, by the Intel/AMD SIMD instruction sets MMX/SSE/SSE2. Portable C versions are provided for compatibility on non-IA32 machines. Routines are provided to compute 16-bit integer dot products (FIR filtering, correlation); sum-of-squares (signal energy measurement), and peak sample detection (for automatic gain control, etc.).
LinkGrammar-WN is a lexicon expansion for the Link Grammar Parser. The Link Grammar Parser is a syntactic parser of the English language that is capable of handling a wide variety of syntactic constructions and is considered quite robust. The LinkGrammar-WN project aims to import lexical information from WordNet in an effort to increase the size of the LGP lexicon. This project is of interest to anyone interested in NLP (natural language parsing) of English text.
alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.
The Virtual Data Center (VDC) is a digital library system "in a box" for numeric data. It provides a complete system for the management, dissemination, exchange, and citation of virtual collections of quantitative data. It provides everything necessary to maintain and disseminate an individual collection of research studies: including facilities for the storage, archiving, cataloging, translation, and dissemination of each collection. On-line analysis is provided, powered by the R Statistical environment.
Schifra is a very robust, highly optimized, and extremely configurable Reed-Solomon error correcting code library for both software and IP core based applications with implementations in C++ and VHDL. Schifra supports standard, shortened, and punctured Reed-Solomon codes. It also has support for stacked product codes and interleaving. Schifra provides a concise, predictable, and deterministic interface which lends itself to easy and seamless integration into the development of complex data communication projects requiring Reed-Solomon error correcting code capabilities.
Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.