Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
WeBuilder 2015 13.3
Make An Offer Widget 1.0
Hotel Booking Script 1.0.2
Compress Mltiple CSS Files 0.0.1
ReadymadeTaxi Booking Script 1.0.2
VISCOM Screen to Video Gold SDK ActiveX 3.0
VISCOM Video Chat Pro ActiveX SDK 6.56
Fax Server Pro 9.3.0902
HTMLPad 2015 13.3
Product Comparison Script 1.0
Rapid PHP 2015 13.3
Bus Booking Script 1.0.2
API Based Travel Booking Script 1.0.2
VISCOM Media Player Gold ActiveX 4.0
VISCOM Outlook Express ActiveX OCX SDK 2.73
Top Code
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
Quick Maintenance and Backup for MS SQL 1.2.16.0
ATN Resume Finder 2.0
Time Slot Booking Calendar PHP 1.0
Availability Booking Calendar PHP 1.0
PHP GZ Blog Script 1.1
WeBuilder 2015 13.3
PHP Digital Download Script 1.0.4
Flippa Clone Script 3.0
WTK MLM Software 1.6.5
Duceplus 2.1
Netflix Clone 3.0
Hulu Clone 3.0
DTM Data Generator for JSON 1.00.01
Top Search
Code To Add Url
Photo Add Comment Php
Website Value
Duplicate Bill Of Electricity Of Best In Mumbai
Dirty Word
Guestbook In Php
Free Html Projects
Php Guestbook Spam
Post The Comment
Guestbook Reviews
Guestbook In Php Replayindex
Free Community Software
Words To Digits
Animated Counter
Video Sharing Project
Related Search
Code To Detect Plagiat
j2me Code To Detect Bluetooth Devices
Source Code To Detect Viruse From Computer
Java Code To Detect Firewall
C Code To Detect Flash Drives
C Code To Detect Pen Drives
Code To Detect Persons In A Video
Source Code To Detect The Line
Matlab Code To Detect Copy Move Forgery
Java Code To Detect Virus
Source Code To Detect Usb Device
Java Code To Detect Remote Firewall
Java Code To Detect Bluetooth Device
C Code To Detect Pen Dirves
Source Code To Detect Firewall Using Java
 Code To Detect Plagiat 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  



Code to Widget Plugin uses PHP files from a specified directory, and (if the file has the proper template tags) adds a Widget.

installation :



How to Detect If Cookies Are ON is a web based tutorial in which author deals with how to detect the cookies existance in the visitors computers with the help of session variables. This is an useful tutorials for the programmers and the ASP...



HOW TO: Detect Which Version of the .NET Framework Is Installed in a Deployment Package is a reference guide which gives how to use this .NET framework software development kit and visual studio. It also gives some points to add a launch condition...



Code to FlowChart is designed to convert source code to flowchart. It helps users to understand complex program structure by visual diagrams. Code to FlowChart is composed of two parts, Code Editor and FlowChart window. The FlowChart window is...



Code to FlowChart is designed to convert source code to flowchart. It helps users to understand complex program structure by visual diagrams. Code to FlowChart is composed of 3 parts, Code Tree, Code Editor and FlowChart window. The FlowChart...



Use it wise(UPDATED!)
There are two seperate parts to this code one which involves building the robot to follow the ball and the other to detect the ball (which is this code....)

Step 1: Install a PC controlled program onto your...



C and C++ parser, that intend to detect unnused code;C++ language used, and ANSI lib only, no OS specific code;



A plug-in element for CruiseControl to detect tag related modifications in a source code repository (CVS).



This compiler tries to detect pieces of code in a program that are not dependant and compile them in a way that the resulting code can be execuded in parallel on a runtime system built to support this. Only an experiment for my thesis.



xCover is a C/C++ library that uses low-impact syntactic signalling to detect code coverage in a code base at runtime



This model presents how one may be able to detect whether an image is in or out of focus using the FFT. StateflowdlT« is used to manage state behavior; the model also makes use of Embedded MATLAB and integration of legacy C code. When running...



Write your RSpec spec file first, then run "spec -r build2spec spec/*" Build2Spec creates (or appends) code files with enough skeleton code to get into real failures so that you can get to work.



The tool helps to detect any resorces leaks (memory, handles etc.) in any Win32 application. Based on hooking of Win API calls: no source code required, attaches to any running process. Call stack available. Agregates leaks by origin.



I like how gevent is making async code to look like sync but non blocking without all the ugly callbacks.
I tried doing that with threads and object proxy (I found great one at: http://pypi.python.org/pypi/ProxyTypes written by Phillip J....



Code to generate degraded letter stimuli, as used in the paper "The remarkable inefficiency of word recognition" (Pelli et al. 2003). Utilizes the Python Imaging Library, and is an example of the usage of this library.



The code to insert a value to a list indirectly ordered by an extra index list is useful by itself.



takes an ambiguous xml file and generates the ET code to generate that xml file. this is useful if you have an example xml file, or an ambiguous xml file that you'd like to use as a template to parameterize certain elements. upgrades coming.



A program that allows you to detect DTMF tones, generated for example pressing any key of your mobile, as it happens on automated phone service lines.
You can record a tone using your microphone (one tone a time); the software will analyze it...



While working with a histogram we may need to detect a peak or crest of the histogram.But the histogram contains a number of local minima & maxima which makes the histogram extremely uneven.While detecting a peak or crest we are intended to...



This function is able to detect almost all types of properties/characteristics present in an LPP such as unbounded solution, alternate optima, degenaracy/cycling and infeasibilty. It only fails to work when there are redundant constraints present...