provides a simple interface for defining and accessing command line arguments. It was intially inspired by the user friendly CLAP libary. The difference is that this library is templatized, so the argument class is type independent. Type independence avoids identical-except-for-type objects, such as IntArg, FloatArg, and StringArg. While the library is not strictly compliant with the GNU or POSIX standards, it is close.
a C library for reading and writing sound files such as AIFF, AU, WAV, and others through one standard interface. It can currently read/write 8, 16, 24 and 32-bit PCM files as well as 32 and 64-bit floating point WAV files and a number of compressed formats.
A Flash Puzzle Platformer. The game was developed as a part of a project course at Chalmers University of Technology, Gothenburg. Cool music and interesting concept.
pictures of most nuclear and thermonuclear atmospheric(or surface) explosions conducted in the period between 1945-1963. On August 5, 1963 limited test ban treaty signed, so all the consequent tests were underground, although there were some exceptions, e.g. China conducted atmospheric tests later. Pictures are grouped by operation names, dimensions and file size shown, almost all of the pictures are color except the ones marked as "bw".
an arcade action puzzle game where the objective is to get rid of all incoming balls by rearranging their order. Currently it includes 12 different levels and two modes of gameplay. The engine allows for easy custom level creation with unlimited number of paths, different speeds, ball-sizes, and rules.
a three-time Oscar-winning and three-time Grammy Award-winning Italian record producer, songwriter and performer. His work with synthesizers during the 1970s and 1980s had a significant influence on new wave, house, techno and electronic music in general.
a different approach to image optimization, based on how image data is stored in different formats. Let’s start with the JPEG format and a simple technique called the eight-pixel grid.
a C++ library that can be used to detect, abort, and rewrite system calls. The possible uses include, but are not limited to, studying the system call trace of a program; sandboxing a program to tighten security; or selectively rerouting system calls, such as file operations, to different paths or even different sytems to create distributed architectures. SVL allows you to change the low level constructs for system call invocation by allowing you access to both the registers and the target program's memory. As well as having the low level access, SVL has high level classes for dealing with the major syscall operation types.
Whether you’re a novice or a seasoned professional, sometimes we all need our memory jogged. It’s never a bad idea to have some convenient references handy just in case. I have listed what I think are some helpful cheat sheets to keep in your camera bag.
an image processing tool that magically removes unwanted objects from your photos. Just paint over them in black, and click go! Uncovers hidden details in your photos. Sit back and watch as cage bars disappear from the zoo, and your old girlfriend or boyfriend fades away. It removes wrinkles, or it can remove entire facial features.
First introduced by George Spafford in this article, the law states that the more the user is presented with false or erroneous alerts, the more they will ignore real alerts in the system.