Search alternatives:
control programming » control programme (Expand search), control programmes (Expand search), cultural programming (Expand search)
coding control » holding control (Expand search), doping control (Expand search), losing control (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
coding mda » coding mode (Expand search), coding pdna (Expand search), coding rna (Expand search)
mda python » via python (Expand search), rpa python (Expand search), msn python (Expand search)
          
  
      
        control programming » control programme (Expand search), control programmes (Expand search), cultural programming (Expand search)
coding control » holding control (Expand search), doping control (Expand search), losing control (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
coding mda » coding mode (Expand search), coding pdna (Expand search), coding rna (Expand search)
mda python » via python (Expand search), rpa python (Expand search), msn python (Expand search)
      1    
    
      2    
    
      
      
                                              “... solutions are valuable, they fall short of generating BR code in diverse programming languages such...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      3    
    
      4    
    
      
      
                                              “... of Extreme Programming. Those used in the design are the use of the technique to test the code before coding...”
Access document
                        
      
              
    
    
  Access document
              Bachelor thesis
  
              
      
      5    
    
      
      
                                              “... LDPC codes, applying a coding technique from its parity control matrix obtained through a method known...”
Access document
                        
      
              
    
    
  Access document
              Bachelor thesis
  
              
      
      6    
    
      
      
                                              “... like in the usual programming languages. We introduce data types and show how to code and keep them...”
Access document
                        
      
              
    
    
  Access document
              Report
  
              
      
      7    
    
      
      
                                              “... related to coding organization. Software development teams have to achieve business deadlines, so they...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      8    
    
      
      
                                              “...There are many programming courses on the market for young people. However, most courses are basic...”
Access document
                        
      
              
    
    
  Access document
              Bachelor thesis
  
              
      
      9    
    
  
      10    
    
      
      
                                              “... to obtain the benefits of the parallel hardwarewhile coding in their preferred programming languages. Second...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      11    
    
  
      12    
    
      
      
                                              “..., the "X" API (Application Programming Interface) was used to select messages that met the defined...”
Access document
                        
      
              
    
    
  Access document
              Doctoral thesis
  
              
      
      13    
    
      
      
                                              “... próprias para gerência e controle de transmissão de dados, segurança de informações, rotinas de verificação...”
Access document
                        
      
              
    
    
  Access document
              Master thesis