Ports Search

Results 791800 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.011 seconds)
japanese/rogue_s-1.3a (Score: 0.0065301135)
Japanized and message separated version of Rogue-clone: Version II
This is a port of Rogue-clone: Version II, but it is enhanced to display messages with Japanese, colored and messages are separated from program (you can make another message version of rogue). This port provide you 4 message files: - Original English message [mesg_E] (but it was broken, please recompile without -DJAPAN, sorry). - Japanised message [mesg] - UTMC (University of Tokyo Microcomputer Club) message [mesg_utmc] - fj.* message [mesg_fj] In this version, high score will be sorted to record by score only, and you can record your own score more than one time. You have to specify a message file to play this version of rogue like this: % rogue_s mesg or without argument, rogue_s will list available messages. Welcome to the Dungeons of Doom...
KMFL keyboard for African Latin writing systems
This is a set of two keyboards that provides a single implementation for many Roman writing systems across Africa, based on results compiled from data from Benin, Burkina Faso, Cameroon, Chad, Cote d'Ivoire, Nigeria, Senegal and Togo. The keyboards are written in Keyman keyboard language and developed by SIL Non-Roman Script Initiative (NRSI). The software is distributed under the X11-style license (http://scripts.sil.org/X11License). This port installs the keyboard so that it can be used through SCIM or IBus KMFL IMEngine (textproc/scim-kmfl-imengine, textproc/ibus-kmfl). Two layouts are provided: * mnemonic layout for any keyboard (using deadkeys); * positional layout for US keyboard (using deadkeys and/or shift-states, i.e. RALT and LALT keys).
devel/language-c-0.4.7 (Score: 0.0064899237)
Analysis and generation of C code
Language C is a Haskell library for the analysis and generation of C code. It features a complete, well tested parser and pretty printer for all of C99 and a large set of GNU extensions.
biology/phred-0.020425.c (Score: 0.0064820847)
Base calling and quality value assignment on DNA sequencing
Phred reads DNA sequencer trace data, calls bases, assigns quality values to the bases, and writes the base calls and quality values to output files. Trace data is read from chromatogram files in the SCF, ABI, and EST formats, even if they were compressed using gzip, bzip2, or UNIX compress. Quality values are written to FASTA format files or PHD files, which can be used by the Phrap sequence assembly program in order to increase the accuracy of the assembled sequence. Base calling and quality value accuracies tested for: ABI models 373, 377, and 3700 Molecular Dynamics MegaBACE LI-COR 4000 Base calling accuracies tested for: ABI model 3100 Beckman CEQ It contains also a data evaluation program called 'daev'. See DAEV.DOC for more information. You must obtain the tarball via e-mail to build. See the web site below.
biology/foldingathome-5.04 (Score: 0.0064820847)
Distributed client for Protein Folding
Folding@home is a distributed computing project -- people from throughout the world download and run software to band together to make one of the largest supercomputers in the world. Every computer takes the project closer to our goals. Folding@home uses novel computational methods coupled to distributed computing, to simulate problems millions of times more challenging than previously achieved. Protein folding is linked to disease, such as Alzheimer's, ALS, Huntington's, Parkinson's disease, and many Cancers. Moreover, when proteins do not fold correctly (i.e. "misfold"), there can be serious consequences, including many well known diseases, such as Alzheimer's, Mad Cow (BSE), CJD, ALS, Huntington's, Parkinson's disease, and many cancers and cancer-related syndromes.
devel/pipestatus-0.6.0 (Score: 0.0064820847)
UNIX/POSIX shell helper for running pipes safely
pipestatus - source file for POSIX shell that allows to obtain an exit status of every program in a pipe. MOTIVATION When we program in shell we often run pipes like this prog1 args1 | prog2 args2 | ... | progN argsN POSIX says that exit status of pipe is the exit status of LAST program in it, i.e. progN in our example. That is, exit status of all other programs in pipe is silently ignored. But in many situations exit status of all programs in pipe should be checked to make program robust. Some shells like BASH and ZSH have special extensions for doing this but POSIX shell unfortunately doesn't provide an EASY way for doing this. In order to solve the problem, described above pipestatus was written.
lang/asn1c-0.9.24 (Score: 0.0064655053)
Modern ASN.1 to C compiler
The asn1c compiles ASN.1 (Abstract Syntax Notation One) specifications into the C source code. This compiler supports automatic constraints checking code generation, parametrization, basic support for Information Object Classes. The produced C code contains the codecs for BER/DER/CER/PER/XER encoding rules. See asn1c-usage.pdf and asn1c(1) manual page for details.
deskutils/fet-5.30.3 (Score: 0.0064530186)
Free timetabling software
FET is open source free software for automatically scheduling the timetable of a school, high-school or university. It uses a fast and efficient timetabling algorithm. Usually, FET is able to solve a complicated timetable in maximum 5-20 minutes. For simpler timetables, it may take a shorter time, under 5 minutes (in some cases, a matter of seconds). For extremely difficult timetables, it may take a longer time, a matter of hours. FET can mean "Free Educational Timetabling" (the "E" in the middle may also stand for other words, based on your personal preference).
security/iaikPkcs11Wrapper-1.2.18 (Score: 0.0064530186)
PKCS#11 Java wrapper
This is a library for the Java platform which makes PKCS#11 (also known as Cryptoki) modules accessible from within Java. A PKCS#11 module is a software library with a defined API which allows access to cryptographic hardware. It usually comes with hardware security modules (HSM), smart cards and crypto tokens (e.g. USB tokens). Thus, the PKCS#11 Wrapper provides Java software access to almost any crypto hardware. For example, a Java application can use it to integrate a HSM or a smart card to create digital signatures, to decrypt data or to unwrap keys.
devel/Algorithm-C3-0.10 (Score: 0.006446939)
Module for merging hierarchies using the C3 algorithm
This module implements the C3 algorithm. I have broken this out into it's own module because I found myself copying and pasting it way too often for various needs. Most of the uses I have for C3 revolve around class building and metamodels, but it could also be used for things like dependency resolution as well since it tends to do such a nice job of preserving local precedence orderings.