Source Code Online Home Categories Top Code New Code Submit Code
Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
DTM Data Generator for JSON 1.00.01
ApPHP WebsiteCleaner 1.0.2
Faxmind Server 5.1.1.0829
DecryptSQL 3.7.0
Fax Server Pro 9.0.0827
dbForge Fusion for Oracle 3.6
Code Line Counter Pro - Delphi Version 6.0
QPack Free Requirements Management Tool 7.0
dbForge Fusion for SQL Server 1.8
dbForge Fusion for MySQL 6.2
Cart2Cart: CRE Loaded to WooCommerce Migration 1.x
Hex Comparison 5.11740
Code Line Counter Pro - COBOL Version 6.0
7 Steps To Appointment Calendar In ASP.NET MVC5 1.0
Online Car Rental Management Software Solution Alpha
Top Code
OpenWire Studio Beta2
SignalLab VC++ 5.0.3
PlotLab VC++ 5.0.3
InstrumentLab VC++ 5.0.3
BasicVideo VC++ 5.0.3
Contest Software - Agriya v2.0b2
AudioLab VC++ 5.0.3
VideoLab .NET 6.0
SignalLab .NET 6.0
PlotLab .NET 6.0
IntelligenceLab .NET 6.0
InstrumentLab .NET 6.0
BasicVideo.NET 6.0
LogicLab VCL 7.0
Visual Live Binding for Delphi 7.0
Top Search
Source Code Of Add Comment In Php
Get Ip Address From Url
Photo Add Comment Php
Free Source Code For Bulletin Board In Java
Board Games
Chess Board Games
Source Code For Chess Board Game In C Language
Source Code For Chess Board In Php
Add Comment Script
How To Insert The Objects On A Chess Board
How To Displaay The Images On The Chess Board
Final Year Computer Science Projects
Source Code For Chess Board
Carpooling Website Php
Movistar Planet
 Exploited Teen 

Code 1-11 of 11   



The G(arbage) C(ollected) X(Query) engine is the first streaming XQuery engine that implements active garbage collection, a novel buffer management strategy in which both static and dynamic analysis are exploited.



Often three dimensional objects need to be reconstructed from planar images that are taken from slices in destructive testing. This sometimes requires the manual selecting of control points, but in this case geometries of the solid can be...



WordPress Popular Posts is a highly customizable sidebar widget that displays the most popular posts on your blog. You can use it as a template tag, too!

IMPORTANT NOTICES:

Due to critical security issues, from WordPress...



Antdns provides a minimalistic management interface for the database backend of Bind-DLZ. If need be, the open structure of both code and database schema can be exploited to provide a seamless integration within any current website.



OpenTest is a generic unit tests front-end that provides test time-out detection and automatic crash recovery. Tests may be run as a post-build step or using a GUI front-end. Test results can easily be exploited and storage to XML is provided.



Includes 1 million verse links, 150,000 commentaries, 31 Bibles, 100 Maps and an easy to use interface with free updates for life.BiblePro uses the same buttons and tools and look and feel of Microsoft Word and Outlook to make it as easy as...



Current direct sequence code division multiple access (DS-CDMA) system suffer from Multiple access interference (MAI) and Inter symbol interference (ISI) due to the frequency selective channel. This interference can be avoided by use of Adaptive...



Here I dond-deOaot provide any code (yet), but Id-deOaod like to hear your voice of feedback about what you fellow Matlab developers think.
The more you express enthusiasm, the sooner there will be actual code available for download.
The...



The Mahalanobis distance between a pattern measurement vector of dimensionality D and the center of the class it belongs to is distributed as a chi^2 with D degrees of freedom, when an infinite training set is used. However, the distribution of...



PRADO is a component-based and event-driven programming framework for developing Web applications in PHP 5.

PRADO provides the following benefits for Web application developers:
- reusability - Codes following the PRADO component...



Paranoid Form Validator can be used to prevent security attacks (cross-site scripting, SQL injection) carried out by submitting forms with malicious data in some cases. It works by adding extra validation to forms and raising error if unsafe data...