Search alternatives:
advanced computational » and computational (Expand search), based computational (Expand search)
computational from » computational foot (Expand search), computation from (Expand search), computational art (Expand search)
the computational » _ computational (Expand search), and computational (Expand search)
computational in » computational and (Expand search), computational _ (Expand search), computational 3d (Expand search)
coding program » cloning program (Expand search), loading program (Expand search), cooling programs (Expand search)
from python » from pathogen (Expand search), from anthony (Expand search)
in coding » on coding (Expand search), in decoding (Expand search), non coding (Expand search)
advanced computational » and computational (Expand search), based computational (Expand search)
computational from » computational foot (Expand search), computation from (Expand search), computational art (Expand search)
the computational » _ computational (Expand search), and computational (Expand search)
computational in » computational and (Expand search), computational _ (Expand search), computational 3d (Expand search)
coding program » cloning program (Expand search), loading program (Expand search), cooling programs (Expand search)
from python » from pathogen (Expand search), from anthony (Expand search)
in coding » on coding (Expand search), in decoding (Expand search), non coding (Expand search)
1
2
3
“... predominant focus is on learning to code as an end itself) and the authentic computational modelling practices...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Book part
4
“..., computational tools are increasingly important to assist in the identification of relevant information...”
Access document
Access document
Article
5
6
7
“... for teaching introductory Python programming. We also highlighted the adaptations made from in-person to online...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
8
9
10
“... for defending against such attacks is the concept of indistinguishable functions which leak no information about...”
Access document
Access document
11
“...The datasets presented in this study can be found in online repositories. The names of the...”
Access document
Access document
Article
12
“... restriction, commonly used in T-RFLP technique. The algorithms were developed in the Ruby programming language...”
Access document
Access document
Master thesis
13
14
15
16
“...Este artigo descreve a implementac¸ao de um programa de formac¸ ˜ ao˜ de professores oferecida...”
Access document
Access document
Article
17
“... a data-driven and computational methodology to measure the impact of the BIP/ZIP Program in Lisbon. Using...”
Access document
Access document
18
“...The objective of this work was to develop a computational tool in Visual Basic Applications (VBA...”
Access document
Access document
Master thesis
19
20
“..., que ja foi utilizado em 109 sequencias de BAC geradas pelo BIOEN (FAPESP Bioenergy Program)....”
Access document
Access document
Doctoral thesis