StackRating

An Elo-based rating system for Stack Overflow
Home   |   About   |   Stats and Analysis   |   Get a Badge
Rating Stats for

Thomas Pornin

Rating
1621.47 (1,063rd)
Reputation
63,417 (1,412th)
Page: 1 ... 8 9 10 11
Title Δ
What's the difference between .lib and .a files? +3.39
-fomit-frame-pointer, is it safe to use it? +3.22
Why do I get a SIGABRT here? +4.02
PGP passphrases in company 0.00
Notification Requirements for "Publicly Available" Encryp... 0.00
"Type and Size Specifier" - Terminology +4.78
How to disable stack trace generation in a java program? +1.24
graceful thread termination with pthread_cond_signal proving proble... -2.89
Why RSA Decryption process takes longer time than the Encryption pr... +3.70
What's the reason high-level languages like C#/Java mask the bit sh... +3.94
Assign one struct to another in C -1.02
How does being able to factor large numbers determine the security... -4.47
Are there circumstances where a hash algorithm can be guaranteed un... -2.42
What exactly happens when sleeping a thread +3.69
Can one encrypt with a private key/decrypt with a public key? +1.98
Iterative version of a recursive algorithm is slower 0.00
Java Methods Running in threads +3.45
Why is the finalize() method in java.lang.Object "protected&qu... +0.11
How to generate a random BigInteger value in Java? +4.69
When an Thread.interrupt() is called on some thread, what happens? +3.98
Is there a benefit to using Julian Dates in code? +3.50
The best learning route into Object Oriented Programming from C? +2.19
How does C compute sin() and other math functions? +2.02
Fast interprocess synchronization method 0.00
Java (anonymous or not) inner classes: is it good to use them? -2.39
Can I find all multisets of given size more efficiently? -2.97
How to pass in a null character in a command line argument in C? +4.67
Windows C API for UTF8 to 1252 0.00
counting records in unix file +3.57
compression with huffman -0.17
write-through RAM disk, or massive caching of file system? +2.60
Preventing MITM attacks on server -1.42
Java : File.exists() inconsistencies when setting "user.dir&qu... -2.10
What is the best way to encrypt SSNs in SQL Server 2008? +3.59
Code readability vs conciseness -2.96
Sign data with MD5WithRSA from .Pem/.Pkcs8 keyfile in C# -1.70
GCC: array type has incomplete element type? +4.26
How to determine how many bytes an integer needs? +4.23
LibTomCrypt and LibTomMath—development status? 0.00
Need to beat the GC and have object destroyed once it goes out of s... -3.69
Why do we have pointers other than void -0.89
Dynamic memory reallocation problem -0.19
Getting 32 bit words out of 64-bit values in C/C++ and not worrying... -3.78
Java ME MD5 string using bouncy castle - cannot hash multiple times +3.77
Setting std=c99 flag in GCC +3.82
how can I get the ARM MULL instruction to produce its output in a u... -4.15
How to convert concatenated strings to wide-char with the C preproc... +4.42
Encrypt a hex string in java -0.55
Do functional languages cope well with complexity? -1.58
ELF binary entry point 0.00