Search alternatives:
java programming » and programming (Expand search), based programming (Expand search), goal programming (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder super » condor super (Expand search), copper super (Expand search), under super (Expand search)
super java » superior java (Expand search)
java programming » and programming (Expand search), based programming (Expand search), goal programming (Expand search)
coding pythons » codigo python (Expand search), coding methods (Expand search)
pythons python » python python (Expand search), pitons python (Expand search), piton python (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder super » condor super (Expand search), copper super (Expand search), under super (Expand search)
super java » superior java (Expand search)
1
2
3
4
5
6
“... software quality and ensure the new feature and code maintenance development pace. Identification tools can...”
Access document
Access document
Doctoral thesis
7
“...,como ferramenta principal para arquitetar o software, e as linguagens de programação python, html, java...”
Access document
Access document
Master thesis
8
“... para utilização da ferramenta de PLN CogComp NLP, SEMAFOR e SupWSD. ii) Bibliotecas Python para estatística...”
Access document
Access document
Master thesis
9
“... Eclipse; Windows and Ubuntu operating systems; Java, PHP, HTML, XML and Javascript programming languages...”
Access document
Access document
Master thesis
10
“... a suspiciousness value to each command inthe code. Most methods, which use this strategy, are heuristics that use...”
Access document
Access document
Master thesis