Search alternatives:
programming secure » programming sector (Expand search), programming service (Expand search), programming pasture (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
coder programming » modern programming (Expand search), cone programming (Expand search), order programming (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search), and python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
programming secure » programming sector (Expand search), programming service (Expand search), programming pasture (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
coder programming » modern programming (Expand search), cone programming (Expand search), order programming (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search), and python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
“... a code analysis and translation engine to generate python code. This engine analyses the application...”
Access document
Access document
8
“... a mechanism that allows the secure production and verification of web-applications JavaScript code. The paper...”
Access document
Access document
9
10
11
Subjects:
“...[en] MULTI-TASK PROGRAMMING...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis
12
13
14
15
“...Random numbers are used in various areas of computing, such as genetic programming, simulations and...”
Access document
Access document
Master thesis
16
“.... Originally designed for execution in web browsers, it has expanded to executing code in restricted and secure...”
Access document
Access document
Article
17
“... makes automated verification of constant-time code an essential component for building secure software...”
Access document
Access document
18
19
“... of lines of code when compared with Aspect Oriented Programming. The separation of concerns attribute had...”
Access document
Access document
Doctoral thesis
20
“... context. The platform shall allow students to submit their code and then, in a controlled and secure...”
Access document
Access document
Master thesis