Search alternatives:
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
services secure » service secure (Expand search), services security (Expand search), services sectors (Expand search)
coder services » modern services (Expand search), over services (Expand search), power services (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
services secure » service secure (Expand search), services security (Expand search), services sectors (Expand search)
coder services » modern services (Expand search), over services (Expand search), power services (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
15
16
“... a mechanism that allows the secure production and verification of web-applications JavaScript code. The paper...”
Access document
Access document
17
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
18
19
“... programming interface with a common framework for discovering smart home services on the constrained WSN, and...”
Access document
Access document
20