Search alternatives:
injection based » injuction based (Expand search), injunction based (Expand search), injection case (Expand search)
code injection » code inspection (Expand search), co2 injection (Expand search), coal injection (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
coder python » codigo python (Expand search), compra python (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
programming » programaming (Expand search)
program » programa (Expand search)
injection based » injuction based (Expand search), injunction based (Expand search), injection case (Expand search)
code injection » code inspection (Expand search), co2 injection (Expand search), coal injection (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
coder python » codigo python (Expand search), compra python (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
programming » programaming (Expand search)
program » programa (Expand search)
1
2
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
3
4
5
6
7
“... solutions are valuable, they fall short of generating BR code in diverse programming languages such...”
Access document
Access document
Master thesis
8
9
10
11
12
13
14
15
“... error correction (FEC) based on low density verification codes (LDPC) has been widely used in several...”
Access document
Access document
Bachelor thesis
16
“... alguns acidentes e transientes, por meio de programas computacionais específicos, para obter a licença...”
Access document
Access document
Master thesis
17
18
“... de falhas transientes. Falhas transientes podem fazer com que as instruções do programa executem...”
Access document
Access document
Master thesis
19
“... threats arise inherent vulnerabilities of web systems, where malicious code or content injection are the...”
Access document
Access document
Master thesis
20
“... simultaneamente em cada intervalo de tempo. Este trabalho apresenta os resultados de um código (programado...”
Access document (1)
Access document (2)
Access document (3)
Access document (1)
Access document (2)
Access document (3)
Doctoral thesis