Buscas alternativas:
secure programming » cone programming (Expandir a busca), remote programming (Expandir a busca), re programming (Expandir a busca)
python coding » action coding (Expandir a busca), python code (Expandir a busca)
coding python » codigo python (Expandir a busca), codigos python (Expandir a busca), using python (Expandir a busca)
coding coding » coding decoding (Expandir a busca), coding canine (Expandir a busca), using coding (Expandir a busca)
coder python » codigo python (Expandir a busca), compra python (Expandir a busca)
coding using » modeling using (Expandir a busca), drying using (Expandir a busca)
using secure » using secury (Expandir a busca), using suture (Expandir a busca), using security (Expandir a busca)
secure programming » cone programming (Expandir a busca), remote programming (Expandir a busca), re programming (Expandir a busca)
python coding » action coding (Expandir a busca), python code (Expandir a busca)
coding python » codigo python (Expandir a busca), codigos python (Expandir a busca), using python (Expandir a busca)
coding coding » coding decoding (Expandir a busca), coding canine (Expandir a busca), using coding (Expandir a busca)
coder python » codigo python (Expandir a busca), compra python (Expandir a busca)
coding using » modeling using (Expandir a busca), drying using (Expandir a busca)
using secure » using secury (Expandir a busca), using suture (Expandir a busca), using security (Expandir a busca)
1
2
3
4
5
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Acessar documento
Acessar documento
Trabalho de conclusão de curso
6
7
8
9
“... solutions are valuable, they fall short of generating BR code in diverse programming languages such...”
Acessar documento
Acessar documento
Dissertação
10
11
12
13
“... LDPC codes, applying a coding technique from its parity control matrix obtained through a method known...”
Acessar documento
Acessar documento
Trabalho de conclusão de curso
14
15
“... is done by signing the meter’s programming code file and using the encryption and authentication of the...”
Acessar documento
Acessar documento
Trabalho de conclusão de curso