As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
Is there any reason that I absolutely should not write my own delta compression library (in C)? I'm working on proprietary project and cannot include any GPL'd code (and most others in fact).Being not an expert in binary data compression, I'm wondering if I do go this way, where should I start? All data involved is highly patterned binary with roughly the same length (~100K).
Sorry for the rather vague question.. Thanks in advance for any insight
Zlib is freely available and reusable, even in proprietary software. (Here is the license.) There is no reason to try and recreate it.
Related
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I'm a newbie programmer looking to create a simple proxy in C that forwards HTTP requests (through TCP). Are there any resources online that can get me started? I've already looked at "Beej's Guide to Network Programming" as it came highly recommended, but I find it to be a little incomplete and hard to follow. Any suggestion would be appreciated!
Why reinventing the wheel?
There is tinyproxy that is fully featured, opensource and free.
https://banu.com/tinyproxy/
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I came across the data mining technique AdaBoost but i can not find much information regarding how it works or any examples i can go through, can someone please shed some light in this area?
Also i would like to give prediction and exploration of data a try, does anyone have any examples?
This tutorial explains the idea very well. At the end of the tutorial, in section Problems, item 4 points you to a simple classification problem which you can try, and item 5 points you to the code of the implementation of the Viola-Jones algorithm in the
OpenCV library. Its object detection framework employs a variant of the AdaBoost to both select the best features and to train classifiers that use them.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
BoxedApp http://www.boxedapp.com/boxedappsdk/ is useful to write programs which need virtual or fake file.
I want to know is there any other Library or Component as an alternative to this for free?
The reason that I need such thing is, I have a stream in memory and need it to play. (stream is a film)
any free alternative? (BoxedApp can handle it.)
I know that Microsoft Detours can be alternative to BoxedApp. As for another alternatives - I do not know.
Good luck
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I know that I can write CGI in many languages, the most are C and Perl.
But why I have to write it in Perl or in C?
What's the difference and what's the (eventually) the best and safe solution?
The advantage of nearly all dynamic languages over C is that it's much harder to get buffer overflows while doing string manipulation, which can easily become a security problem.
Also Perl has libraries that help you dealing with the CGI protocol, and they are battle tested and stable.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 11 years ago.
I have developed a sample code that does AES-256 Encryption. It takes a key, and using that key it can encrypt and decrypt message. Now I want to implement key sharing mechnaism.
Which Key-sharing algorithm is the best, and fits in this scenario.
Also please tell me which cryptography is best(asymmetric or symmetric).
Thanks,
Pawan
I have developed a sample code that does AES-256 Encryption
I hope this will not become production code. I bet your implementations has a ton of side channels allowing for key extraction.
Which Key-sharing algorithm is the best, and fits in this scenario.
That strongly depends on the application in question.