Search alternatives:
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
detecting based » detection based (Expand search), detecting and (Expand search), detector based (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
detecting based » detection based (Expand search), detecting and (Expand search), detector based (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
“...-definidas são usualmente aplicadas globalmente no programa na tentativa de revelar onde se encontram...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
3
4
5
“... testing integrated code, build and test conflicts, respectively. Detecting such semantic conflicts...”
Access document
Access document
Doctoral thesis
6
7
8
9
“... by certification standards. Taking this into consideration, BETA provides a tool-supported, model-based testing...”
Access document
Access document
Doctoral thesis
10
“...Debugging a software program constitutes a significant and laborious task for programmers, often...”
Access document
Access document
Master thesis
11
12
13
14
15
16
“... same configuration (e.g., code). Test flakiness negatively affects regression testing as failure...”
Access document
Access document
Master thesis
17
“...Detecting communities from complex networks has triggered considerable attention in several...”
Access document
Access document
18
19
“... threats arise inherent vulnerabilities of web systems, where malicious code or content injection are the...”
Access document
Access document
Master thesis
20
“... manually detecting equivalent mutants is an error-prone and time- consuming task. Therefore, even partial...”
Access document
Access document
Bachelor thesis