Search alternatives:
coder implementations » code implementation (Expand search), model implementations (Expand search), core implementations (Expand search)
implementations based » implementation based (Expand search), implementations and (Expand search), implementation case (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
python coding » action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
based secure » based security (Expand search), and secure (Expand search), based sexual (Expand search)
coder implementations » code implementation (Expand search), model implementations (Expand search), core implementations (Expand search)
implementations based » implementation based (Expand search), implementations and (Expand search), implementation case (Expand search)
secure programming » cone programming (Expand search), remote programming (Expand search), re programming (Expand search)
python coding » action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
based secure » based security (Expand search), and secure (Expand search), based sexual (Expand search)
1
2
3
4
5
6
7
8
9
“... makes automated verification of constant-time code an essential component for building secure software...”
Access document
Access document
10
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
11
12
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
13
14
15
16
17
18
19
“... demonstrate how a greater computer control through High- Level programming languages (like Python for example...”
Access document
Access document
Master thesis
20
“... of Programming Logic”. The construction of this work was based on qualitative research of an exploratory nature...”
Access document
Access document
Master thesis