Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programmer function » programme function, programming function, programming functions
java programmer » java programmers, java programmer's, java programming
function three » function theorem, section three, function through
parallel java » parallel data, parallel scara, parallel a
three https » three hotels
programmer function » programme function, programming function, programming functions
java programmer » java programmers, java programmer's, java programming
function three » function theorem, section three, function through
parallel java » parallel data, parallel scara, parallel a
three https » three hotels
1
Published 2013
Table of Contents:
“... -- Testing, Profiling, and Empirical Studies -- What Programmers Do with Inheritance in Java -- Is This a Bug...”View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... -- Beautiful Imperative Code: A Functional Ace in the Hole for Imperative Programmers....”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... Experiments on Light-Weight Object-Functional-Logic Programming in Java with Paisley -- Heuristic Search Over...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“... for Static Deadlock Prevention -- Automatically Partitioning Data to Facilitate the Parallelization...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“... of Programmable Logic Controller Code -- Modeling Firmware as Service Functions and Its Application to Test...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Distributed Resources Allocation in Massively Parallel Processors on-Chip -- Cooperative Learning Sensitive...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... on a Massively Parallel Embedded Processor -- Stream Image Processing on a Dual-Core Embedded System...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”View full text
Electronic
eBook



