Search alternatives:
sources detection » source detection (Expand search), source detector (Expand search), source selection (Expand search)
detection program » selection program (Expand search), protection program (Expand search), detection problem (Expand search)
coder sources » copper sources (Expand search), power sources (Expand search), under sources (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
sources detection » source detection (Expand search), source detector (Expand search), source selection (Expand search)
detection program » selection program (Expand search), protection program (Expand search), detection problem (Expand search)
coder sources » copper sources (Expand search), power sources (Expand search), under sources (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
“... sintática do código. Para evoluir famílias de programas de forma segura, foram propostas duas estratégias...”
Access document
Access document
Doctoral thesis
8
“... sintática do código. Para evoluir famílias de programas de forma segura, foram propostas duas estratégias...”
Access document
Access document
Doctoral thesis
9
10
11
“... using the colorimetric method of rapid detection with p-iodonitrotetrazolium chloride (INT), and the...”
Access document
Access document
12
“... or format, as long as you give appropriate credit to the original author(s) and the source, provide a link...”
Access document
Access document
Article
13
14
15
16
17
18
19
20
“...[pt] Programação segura é a prática de se escrever programas que são resistentes a ataques...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis