Search alternatives:
based programming » and programming (Expand search), based program (Expand search), cone programming (Expand search)
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
detecting in » detecting ring (Expand search), detecting and (Expand search), detecting hiv (Expand search)
using coding » using coping (Expand search), using coating (Expand search), using cooking (Expand search)
coding piton » coding in (Expand search), coding with (Expand search), coding to (Expand search)
piton python » pitons python (Expand search), in python (Expand search), with python (Expand search)
in based » tin based (Expand search), in base (Expand search), in basel (Expand search)
based programming » and programming (Expand search), based program (Expand search), cone programming (Expand search)
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
detecting in » detecting ring (Expand search), detecting and (Expand search), detecting hiv (Expand search)
using coding » using coping (Expand search), using coating (Expand search), using cooking (Expand search)
coding piton » coding in (Expand search), coding with (Expand search), coding to (Expand search)
piton python » pitons python (Expand search), in python (Expand search), with python (Expand search)
in based » tin based (Expand search), in base (Expand search), in basel (Expand search)
1
2
Subjects:
“...plagiarism detection, similarity analysis, laboratory programming practices...”
Access document
Access document
Master thesis
3
“... programming. The target users of this system are children who, using the pieces, build a tangible code, take...”
Access document
Access document
Master thesis
4
5
6
7
9
10
11
12
13
14
“... manually detecting equivalent mutants is an error-prone and time- consuming task. Therefore, even partial...”
Access document
Access document
Bachelor thesis
15
“...This work is contextualized in the problem of plagiarism detection among source codes...”
Access document
Access document
Master thesis
16
“...It is undeniable that technologies, such as those derived from programming languages, applied...”
Access document
Access document
Master thesis
18
19
20