C programming find function jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    203 c programming find function jobs found, pricing in AUD

    ...slow pace due to their limited capacity thus non commitment to my project. So you would either develop the app from scratch or continue where they left off depending if you find the code and documentation clear and easy to work to with. If continuing on the project, the previous freelancer will be available for support for a while. ------- PROJECT DESCRIPTION:

    $5632 (Avg Bid)
    $5632 Avg Bid
    140 bids

    It is a must to have worked in programming VRP problems in C++. First, I need to modify the structure and the organization of the zipped attached algorithm that it should be similar to the attached example algorithm structure in the same zipped file, as follow: Header file: • Data “functions” • Capacity • Time • Distance Initial solution

    $105 (Avg Bid)
    $105 Avg Bid
    6 bids

    ...html5 css3 Jquery. AD: As a programming mentor, via "screen share webcam" you'll not develop any software but meet few times a month/or week on the client help need basis for 1hour online mentoring session at a client preferred USA-EST 7/8/9pm by providing to the client a full lifecycle software development based programming help and explaining A thru

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    3 bids

    ...and programming is equal to zero, I feel tricked. The result is that I still don't have a webpage, and have been tricked to move my hosting to a server that really ain't reliable. I have purchased different themes, as the guy I hired told me there is no possibility to change an already made template. So, now I try again. Hopefully I will find someone

    $222 (Avg Bid)
    $222 Avg Bid
    61 bids

    ...single process and knows nothing about which physical memory pages have been allocated to this process or the mapping from virtual addresses to physical addresses. The C programming language defines its allocator with the functions malloc() and free() found in "stdlib.h" as follows: void *malloc(size_t s): allocates s bytes and returns a pointer

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    8 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using C or C++. I need you to develop some software for me. I would like this software to be developed for Linux using C or C++. Small homework projects. Jee-mail, a small email service provider, has been receiving complaints from customers claiming

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    I need you to develop some software for me. I would like this software to be developed for Linux using C or C++. I need you to develop some software for me. I would like this software to be developed for Linux using C or C++. Small homework projects. Jee-mail, a small email service provider, has been receiving complaints from customers claiming that

    $53 (Avg Bid)
    $53 Avg Bid
    20 bids

    I need you to develop some software for me. I would like this software to be developed for Linux using C or C++. Small homework projects. Jee-mail, a small email service provider, has been receiving complaints from customers claiming that their inboxes are clogged with the dozens of spam email messages they receive each day. Consequently, Jee-mail

    $57 (Avg Bid)
    $57 Avg Bid
    7 bids

    We want to create a simple desktop chat application using Visual Studio and .NET. The programming shall be done in C#, using WPF for creating the UI and WCF for exposing the underlying core datastructure and repository. As a design structure we want to implement DDD-principles. When it comes to functionality the application is not very different to

    $1831 (Avg Bid)
    $1831 Avg Bid
    35 bids

    I need some expert in C programming to write a C function that can use a graph and find shortest path between nodes using BFS

    $38 (Avg Bid)
    $38 Avg Bid
    4 bids

    ...next one before timing out.) You could then place a similar block after that one to collect the user's county. After the user's input is collected, the next step is to use a function to determine which queue they should be placed in, based on the user's input. This part requires some ability to write programs, which unfortunately is not a service that

    $113 (Avg Bid)
    $113 Avg Bid
    5 bids

    ...Python3 for the following questions involving programming. 1. Analyze the code given in [login to view URL] and please add appropriate documentation. 2. Write the contents of function Site_finder(full_seq, subseq) in [login to view URL] along with a set of unit tests. 3. Write a search function to satisfy a given set of criteria (described

    $75 (Avg Bid)
    $75 Avg Bid
    8 bids

    Programming Project 3 Requirement: In this project you will implement HMAC (Keyed-hash Message Authentication Code) using SHA-512 as the building block. HMAC with key K of a input message M can be expressed as: where is the key padded out to block size, which is 1024 bits when we use SHA-512. Here, opad, ipad are specified padding constants, which

    $77 (Avg Bid)
    $77 Avg Bid
    9 bids

    Programming Project 3 Requirement: In this project you will implement HMAC (Keyed-hash Message Authentication Code) using SHA-512 as the building block. HMAC with key K of a input message M can be expressed as: where is the key padded out to block size, which is 1024 bits when we use SHA-512. Here, opad, ipad are specified padding constants, which

    $116 (Avg Bid)
    $116 Avg Bid
    12 bids

    ...time sharing multiprogramming system. In Assignment 2 (more details to be provided later), you will analyse the Assignment 1 program submitted by another student, to try to find security vulnerabilities in the program. The program requires two command line arguments to execute and they are: 1. numthreads – an integer value that specifies how many

    $178 (Avg Bid)
    $178 Avg Bid
    6 bids

    ...time sharing multiprogramming system. In Assignment 2 (more details to be provided later), you will analyse the Assignment 1 program submitted by another student, to try to find security vulnerabilities in the program. The program requires two command line arguments to execute and they are: 1. numthreads – an integer value that specifies how many

    $93 (Avg Bid)
    $93 Avg Bid
    2 bids

    ...multiple candidates for this part to find the best developer. The chosen developer will be asked to complete the rest of the project. Let me know if you have any questions. Below are the requirements for the portion: We need to create two pages 1. the first page is the profile, which the user can use the image upload function. When the user uploads the pictures

    $1248 (Avg Bid)
    $1248 Avg Bid
    48 bids

    Program Description: (to be written in C++ language) Build a hash table using chaining as the collision resolution technique. Insertions into the hash table will correspond to declarations of variables and values in a program, searches will be requests for the value of a variable. Some variables will be local and have a narrow scope while some variables

    $57 (Avg Bid)
    $57 Avg Bid
    5 bids

    ...executed in a time sharing multiprogramming system. In part II (more details to be provided later), you will analyse the Part-1 program submitted by another student, to try to find security vulnerabilities in the program. The program requires two command line arguments to execute and they are: 1. numthreads – an integer value that specifies how many

    $70 (Avg Bid)
    $70 Avg Bid
    3 bids