Search alternatives:
coder implementing » after implementing (Expand search), or implementing (Expand search), toward implementing (Expand search)
implementing and » implementing an (Expand search), implementing _ (Expand search), implementing the (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder implementing » after implementing (Expand search), or implementing (Expand search), toward implementing (Expand search)
implementing and » implementing an (Expand search), implementing _ (Expand search), implementing the (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
12
13
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
14
“... as Random Forest, Decision Tree and Neural Network performed better when using code metrics to identify...”
Access document
Access document
Master thesis
15
16
“... meanwhile, a proposal [2] exists for extending the Ada language with new basic constructs which can be used...”
Access document
Access document
17
18
“... implementing a lightweight authentication protocol, the SNI protects the system from spoofing and flooding...”
Access document
Access document
Bachelor thesis
19
20