Search alternatives:
access programming » access programme (Expand search), agent programming (Expand search), access program (Expand search)
coverage access » coverage paces (Expand search), coverage class (Expand search), coverage affects (Expand search)
coder coverage » code coverage (Expand search), cancer coverage (Expand search), center coverage (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
pitons » citons (Expand search), pitoni (Expand search), pitoes (Expand search)
access programming » access programme (Expand search), agent programming (Expand search), access program (Expand search)
coverage access » coverage paces (Expand search), coverage class (Expand search), coverage affects (Expand search)
coder coverage » code coverage (Expand search), cancer coverage (Expand search), center coverage (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
pitons » citons (Expand search), pitoni (Expand search), pitoes (Expand search)
1
2
3
“... straightforward, because lecture hours and the coverage of programming topics must remain the same, while testing...”
Access document
Access document
Conference object
4
“... straightforward, because lecture hours and the coverage of programming topics must remain the same, while testing...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Conference object
5
6
7
8
“...Several strategies have supported test quality measurement and analysis. For example, code coverage...”
Access document
Access document
Article
9
10
11
“...Ensuring quality, performance, reducing time and avoiding rework in manually correcting code...”
Access document
Access document
Bachelor thesis
13
14
“... dos Bois in the last three decades and to verify if they are associated with changes in use and coverage...”
Access document
Access document
Master thesis
15
“...Modern programming languages (e.g., Java and C#) provide features to separate error-handling code...”
Access document
Access document
Master thesis
16
17
“... a suspiciousness value to each command inthe code. Most methods, which use this strategy, are heuristics that use...”
Access document
Access document
Master thesis
18
19