Search alternatives:
an programmers » and programmers (Expand search), non programmers (Expand search), in programmes (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
an programmers » and programmers (Expand search), non programmers (Expand search), in programmes (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
1
2
3
4
5
“...This paper briefly proposes a technique to detect energy inefficient fragments in the source code...”
Access document
Access document
6
Subjects:
“...[en] SOURCE CODE...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
7
8
9
10
11
12
“... even the way it does it without the need to consult other developers, and breaking their code. This...”
Access document
Access document
13
14
15
16
“... solution, the use of comments and so on, allow comparison of programmers through static analysis of their...”
Access document
Access document
17
“... evaluation of a programmer’s skills and proficiency on a given language or the continuous evaluation...”
Access document
Access document
18
“... analysis of transactional code generated by GCC and by a proposed transactional memory support added to the...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
19
20
“...Cybercrime has increased over the past few years, as has the number of victims and the amount...”
Access document
Access document
Master thesis