Code

Results: 200833



#Item
31Path Exploration during Code Navigation  by Kaitlin Duck Sherwood B.Sc., University of Illinois at Urbana-Champaign, 1984 M.Sc., University of Illinois at Urbana-Champaign, 1996

Path Exploration during Code Navigation by Kaitlin Duck Sherwood B.Sc., University of Illinois at Urbana-Champaign, 1984 M.Sc., University of Illinois at Urbana-Champaign, 1996

Add to Reading List

Source URL: webfoot.com

Language: English - Date: 2008-08-20 20:37:11
32    Code of Conduct    TL;DR.​ Be respectful. Harassment and abuse are never tolerated. If you are in a situation that 

    Code of Conduct    TL;DR.​ Be respectful. Harassment and abuse are never tolerated. If you are in a situation that 

Add to Reading List

Source URL: sachacks.io

Language: English - Date: 2018-10-25 23:07:17
33Butler County Candidate Petition Filing Checklist The Board strongly recommends that candidates review all petitions before filing The Ohio Revised Code does not permit any corrections or additions after the time of fili

Butler County Candidate Petition Filing Checklist The Board strongly recommends that candidates review all petitions before filing The Ohio Revised Code does not permit any corrections or additions after the time of fili

Add to Reading List

Source URL: www.butlercountyelections.org

Language: English - Date: 2017-03-15 14:47:38
34Numerical quality: an industrial case study on code_aster Numerical Software Verication

Numerical quality: an industrial case study on code_aster Numerical Software Verication

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2017-07-27 09:38:49
35Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:58:38
36SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. ReliabPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: stvr.1475 A survey of code-based change impact analysis te

SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. ReliabPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: stvr.1475 A survey of code-based change impact analysis te

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
37IntroducingNew MFJ CWMorse Micro Telegraph Keys MFJ-566M, $2995 Red/Black Micro Morse Code Key with aluminum

IntroducingNew MFJ CWMorse Micro Telegraph Keys MFJ-566M, $2995 Red/Black Micro Morse Code Key with aluminum

Add to Reading List

Source URL: www.mfjenterprises.com

- Date: 2018-09-06 12:41:54
    38Recount Procedures Automatic Recounts All recounts are conducted in accordance with the Ohio Revised Code 3515 and Ohio Secretary of State Directiveon Recount Procedures. When an Automatic Recount Must Be Conduc

    Recount Procedures Automatic Recounts All recounts are conducted in accordance with the Ohio Revised Code 3515 and Ohio Secretary of State Directiveon Recount Procedures. When an Automatic Recount Must Be Conduc

    Add to Reading List

    Source URL: www.butlercountyelections.org

    Language: English - Date: 2017-12-05 11:09:38
    39Learning to generate HTML code from images with no supervisory data Ali Davody * 1 Homa Davoudi * 1 Mihai S. Baba 1 R˘azvan V. FlorianIntroduction

    Learning to generate HTML code from images with no supervisory data Ali Davody * 1 Homa Davoudi * 1 Mihai S. Baba 1 R˘azvan V. FlorianIntroduction

    Add to Reading List

    Source URL: uclmr.github.io

    Language: English - Date: 2018-08-06 06:17:49
    40Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

    Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04