Search alternatives:
time programming » the programming (Expand search), line programming (Expand search), game programming (Expand search)
coder sharing » code sharing (Expand search), cower sharing (Expand search), power sharing (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
sharing time » shaping time (Expand search), sharing the (Expand search), wearing time (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
time programming » the programming (Expand search), line programming (Expand search), game programming (Expand search)
coder sharing » code sharing (Expand search), cower sharing (Expand search), power sharing (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
sharing time » shaping time (Expand search), sharing the (Expand search), wearing time (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
12
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
13
“...Probabilistic programming is a way to create systems that help us make decisions in the face...”
Access document
Access document
Master thesis
14
15
“... backgrounds, with different levels, to acquire programming skills, which could reduce the time from data...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
16
“...-time systems using the worst-case execution time (WCET) as the safety parameter. The verification...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
17
18
19
20