Search alternatives:
in programming » and programming (Expand search), _ programming (Expand search), c programming (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder last » coded last (Expand search), poder las (Expand search), codes fast (Expand search)
last in » blast in (Expand search), last man (Expand search), last and (Expand search)
in programming » and programming (Expand search), _ programming (Expand search), c programming (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder last » coded last (Expand search), poder las (Expand search), codes fast (Expand search)
last in » blast in (Expand search), last man (Expand search), last and (Expand search)
1
2
3
4
5
6
7
8
9
10
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
11
12
13
14
15
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
16
“...We develop a new approach for building cryptographic implementations. Our approach goes the last...”
Access document
Access document
17
18
19
“....Unfortunately,spreadsheetsystemsdonotoffermodular mechanisms, and as a consequence, some of the previous tasks may be defined by adding intrusive “code” to the...”
Access document
Access document
20