Search alternatives:
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
efficient secure » efficient feature (Expand search), efficient source (Expand search), efficient second (Expand search)
coder efficient » power efficient (Expand search), codec efficiency (Expand search), codes efficiency (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
efficient secure » efficient feature (Expand search), efficient source (Expand search), efficient second (Expand search)
coder efficient » power efficient (Expand search), codec efficiency (Expand search), codes efficiency (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
10
11
“.... Originally designed for execution in web browsers, it has expanded to executing code in restricted and secure...”
Access document
Access document
Article
12
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
13
“... (WSN) to the Internet in a secure, simple and efficient way, and describe the design and implementation...”
Access document
Access document
14
15
16
17
18
19
20