Search alternatives:
pythcomputer programming » computer programming (Expand search), computers programming (Expand search), computer programing (Expand search)
python pythcomputer » python computer (Expand search)
data programming » java programming (Expand search), meta programming (Expand search), ataux programming (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
python using » python usando (Expand search), python coding (Expand search), action using (Expand search)
using python » usando python (Expand search), in python (Expand search)
coding data » encoding data (Expand search), closing data (Expand search), coding dna (Expand search)
          
  
      
        pythcomputer programming » computer programming (Expand search), computers programming (Expand search), computer programing (Expand search)
python pythcomputer » python computer (Expand search)
data programming » java programming (Expand search), meta programming (Expand search), ataux programming (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
python using » python usando (Expand search), python coding (Expand search), action using (Expand search)
using python » usando python (Expand search), in python (Expand search)
coding data » encoding data (Expand search), closing data (Expand search), coding dna (Expand search)
      1    
    
      2    
    
      3    
    
      4    
    
      5    
    
      6    
    
      7    
    
      8    
    
      9    
    
      
      
                                              “... solutions are valuable, they fall short of generating BR code in diverse programming languages such...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      10    
    
      11    
    
      
      
                                              “...Names in programming are vital for understanding the meaning of code and big data. We define code...”
Access document (1)
Access document (2)
                        
      
              
    
    
  Access document (1)
Access document (2)
              Article
  
              
      
      12    
    
      
      
                                              “... designed and tested using data, which is usually far from the real, production, data. So, coding DDL and...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      13    
    
      
      
                                    Subjects:
                                “...[en] COVERING CODE...”
Access document (1)
Access document (2)
Access document (3)
                        
      
              
    
    
  Access document (1)
Access document (2)
Access document (3)
              Doctoral thesis
  
              
      
      14    
    
      15    
    
      16    
    
      
      
                                              “... like in the usual programming languages. We introduce data types and show how to code and keep them...”
Access document
                        
      
              
    
    
  Access document
              Report
  
              
      
      17    
    
  
      18    
    
      
      
                                              “... development of web applications, allowing for efficient updates of code and data. However, the construction...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      19    
    
  
      20    
    
      
      
                                              “... is done by signing the meter’s programming code file and using the encryption and authentication of the...”
Access document
                        
      
              
    
    
  Access document
              Bachelor thesis