Search alternatives:
compromises programming » compromise programming (Expand search)
and compromises » and promises (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
compromises programming » compromise programming (Expand search)
and compromises » and promises (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder and » code and (Expand search), codes and (Expand search), poder and (Expand search)
1
2
3
4
5
“... for heterogeneous programming, manycore processors and CPUs combined with GPGPUs stand out as the most expressive...”
Access document
Access document
Bachelor thesis
6
7
“... representations compromise both programming and execution efficiency. Recent nonvolatile memory technologies, such...”
Access document
Access document
Doctoral thesis
8
9
“... Coroutines and RxJava while reusing as much code as possible. There is a single module dedicated to the main...”
Access document
Access document
Master thesis
10
“... educacional, tal como se presta o Learning and Performance Orientations in Physical Education Classes...”
Access document
Access document
Master thesis
11
12
“... applied codes. Contemporary Animation and its target audience. Special Effects and its manipulators...”
Access document
Access document
13
14
15
16
17
“...In a collaborative development context, merge conflicts might compromise software quality and...”
Access document
Access document
Doctoral thesis
18
19
20
“.... However, smart contracts are subject to security flaws, mainly caused by programming errors and...”
Access document
Access document
Master thesis