Search alternatives:
different programming » different programs (Expand search), differentiable programming (Expand search), different processing (Expand search)
coverage different » leverage different (Expand search), coverage differences (Expand search), covering different (Expand search)
coder coverage » code coverage (Expand search), cancer coverage (Expand search), center coverage (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
different programming » different programs (Expand search), differentiable programming (Expand search), different processing (Expand search)
coverage different » leverage different (Expand search), coverage differences (Expand search), covering different (Expand search)
coder coverage » code coverage (Expand search), cancer coverage (Expand search), center coverage (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
“... model-checker) that refinement-checks the code generated by JCircus. Combined with coverage-based...”
Access document
Access document
Doctoral thesis
2
3
4
5
6
7
8
9
10
11
12
13
15
16
“... que foram selecionadas após uma revisão da literatura. Como contribuições deste trabalho, destacam-se: i) wrappers python...”
Access document
Access document
Master thesis
17
“...Modern programming languages (e.g., Java and C#) provide features to separate error-handling code...”
Access document
Access document
Master thesis
18
“... a suspiciousness value to each command inthe code. Most methods, which use this strategy, are heuristics that use...”
Access document
Access document
Master thesis
19