Search alternatives:
set programming » based programming (Expand search), _ programming (Expand search), and programming (Expand search)
coding methods » costing methods (Expand search), cooking methods (Expand search), cooling methods (Expand search)
methods python » methods action (Expand search), pythons python (Expand search), methods method (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
coding set » coding at (Expand search), coding based (Expand search), coding tests (Expand search)
          
  
      
        set programming » based programming (Expand search), _ programming (Expand search), and programming (Expand search)
coding methods » costing methods (Expand search), cooking methods (Expand search), cooling methods (Expand search)
methods python » methods action (Expand search), pythons python (Expand search), methods method (Expand search)
coding coding » coding decoding (Expand search), coding using (Expand search), coding canine (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coder coding » modern coding (Expand search), color coding (Expand search), odor coding (Expand search)
coding set » coding at (Expand search), coding based (Expand search), coding tests (Expand search)
      1    
    
      2    
    
      3    
    
      4    
    
      5    
    
      
      
                                    Subjects:
                                “...[en] COVERING CODE...”
Access document (1)
Access document (2)
Access document (3)
                        
      
              
    
    
  Access document (1)
Access document (2)
Access document (3)
              Doctoral thesis
  
              
      
      6    
    
  
      7    
    
      
      
                                              “... evaluation aimed at supporting students to improve their source code and, consequently, their programming...”
Access document (1)
Access document (2)
                        
      
              
    
    
  Access document (1)
Access document (2)
              Conference object
  
              
      
      8    
    
      
      
                                              “... evaluation aimed at supporting students to improve their source code and, consequently, their programming...”
Access document
                        
      
              
    
    
  Access document
              Conference object
  
              
      
      9    
    
      10    
    
      11    
    
      
      
                                              “... de los algoritmos de cálculo en el lenguaje de programación Python, debido a las características...”
Access document
                        
      
              
    
    
  Access document
              Article
  
              
      
      12    
    
      
      
                                              “... to the CSS realm and to foster stylesheets structured programming. At the same time, a new set of tools...”
Access document
                        
      
              
    
    
  Access document
              Article
  
              
      
      13    
    
  
      14    
    
      
      
                                              “... to obtain the benefits of the parallel hardwarewhile coding in their preferred programming languages. Second...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      15    
    
  
      16    
    
  
      17    
    
      
      
                                              “... to be developed, programmers often face a trade-off between coding productivity, code portability, and performance...”
Access document
                        
      
              
    
    
  Access document
              Doctoral thesis
  
              
      
      18    
    
      
      
                                              “... or burst errors, which makes the whole set vulnerable, if no fault tolerance technique is applied. Thus...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      19    
    
      
      
                                              “... Wide Web (www). Thus, it developed a set of computational tools, called OneSix, for T-RFLP analysis...”
Access document
                        
      
              
    
    
  Access document
              Master thesis
  
              
      
      20    
    
      
      
                                              “... guarantee through a coding system the verification of violations and the entire negotiation process between...”
Access document
                        
      
              
    
    
  Access document
              Bachelor thesis