Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Programmers'
Programmers published presentations and documents on DocSlides.
Phillip Wu Long
by ellena-manuel
10/27/14. Period 4A. Report on the Computer Progr...
Educating Programmers:
by tawny-fly
A . C. ustomer . P. erspective. Alexander Stepano...
Peer
by kittie-lecroy
Interaction . Effectively, yet . Infrequently, En...
Educating Programmers:
by conchita-marotz
A . C. ustomer . P. erspective. Alexander Stepano...
Potential financial motivations
by marina-yarberry
for end-user programming. Christopher . Scaffidi....
Potential financial motivations
by karlyn-bohler
for end-user programming. Christopher . Scaffidi....
How Programmers Debug, Revisited:
by olivia-moreira
An Information Foraging Theory Perspective. Josep...
Pseudo-code
by aaron
Komate. AMPHAWAN. Preliminary. Pseudocode is an ...
1 How We Refactor, and
by marina-yarberry
How We Know It. Emerson . Murphy-Hill. Portla...
5-a-Day Why is Rae Earl awake at 3am?
by pamella-moone
5-a-Day Why is Rae Earl awake at 3am? ‘Harry b...
Trait-Based Personality Profile of Software Programmers
by candy
A Study on Pakistan’s Software Industry. By . Aa...
Genetic Algorithms and Machine Learning for Programmers: Create AI Models and Evolve Solutions (Pragmatic Programmers)
by riyandorien
It’s no secret that this world we live in can be...
[READING BOOK]-An Illustrated Guide for z/Architecture Assembler Programmers: A compact reference for application programmers
by johncarlozetan
The Desired Brand Effect Stand Out in a Saturated ...
[eBOOK]-An Illustrated Guide for z/Architecture Assembler Programmers: A compact reference for application programmers
by advaithiziah
The Desired Brand Effect Stand Out in a Saturated ...
Asking and Answering Questions during a Programming Change Task
by oneill
Jonathan Sillito, Member, IEEE Computer Society, G...
Are Automated Debugging Techniques Actually Helping Programmers Chris Parnin and
by conchita-marotz
parninorsogatechedu ABSTRACT Debugging is notoriou...
Are Automated Debugging Techniques Actually Helping Programmers Chris Parnin and
by debby-jeon
parninorsogatechedu ABSTRACT Debugging is notoriou...
A Programmers Guide to Data Mining The Ancient Art of
by tatiana-dople
my wife Cheryl Roz and Bodhi my son Adam Roper al...
Computer Programming Effective Catalog Year Revised April Page of Program Planning Guide Computer Programming Associate in Applied Science Degree credits Web Design Certificate of Proficiency
by tawny-fly
Computer programmers design b uild and support so...
Splendid Isolation A Slice Abstraction for SoftwareDened Networks Stephen Gutz Cornell Alec Story Cornell Cole Schlesinger Princeton Nate Foster Cornell ABSTRACT The correct operation of many network
by debby-jeon
To achieve isolation programmers typically resort...
Microsoft Builds Software Teams of programmers and tes
by lois-ondreau
Since the mid1980s Microsoft and other PC softwar...
Distribution of Software Contributors and Distributor
by phoebe-click
Often these programmers work for companies that a...
eROSE Guiding Programmers in Eclipse Thomas Zimmermann
by luanne-stotts
csunisbde ABSTRACT The e ROSE plugin for ECLIPSE u...
Wecannot count on programmers to have correctly guessed
by phoebe-click
well within the margins of your sheet of graph pap...
TCP/IP Sockets in C:
by kittie-lecroy
Practical Guide for Programmers Michael J. Donahoo...
Scaling Craftsmanship Through Apprenticeship
by lois-ondreau
Chris McKenzie. Personal History. Started Program...
Introduction to Lisp
by conchita-marotz
Peter D. Karp, Ph.D.. Bioinformatics Research Gro...
(How) Can Programmers Conquer the
by celsa-spraggs
Multicore. Menace? . Saman Amarasinghe. . Compu...
Programming
by giovanna-bartolotta
Software is made by programmers. Computers need a...
Technology
by lois-ondreau
in Action. Alan Evans . •. . Kendall Martin....
Goal Directed Design Prevents Dancing Bearware
by tatyana-admore
Andrew Steele. twitter: . ahsteele. blog: http://...
software has bugs would like to allow programmers to specif
by giovanna-bartolotta
4Example: Format String Vulnerabiliti ("%s", name)...
The Horstmann 425 Tiara and Diadem programmers are 2 circuit central h
by marina-yarberry
User Operating Instructions The simple instruction...
The Teaching of Novice Computer Programmers: ch Approach to Australi
by mitsue-stanley
population from several universities (McCracken et...
The History of
by trish-goza
Women in Tech. Sarah Dutkiewicz. sarah@cletechcon...
Chapter 12 Programming
by briana-ranney
Concepts and Languages. Chapter 12. Programming ...
Chapter 12 Computer Programming
by kittie-lecroy
Chapter Contents. Section A: Programming Basics. ...
Unit E Step-by-Step: Programming with Python
by giovanna-bartolotta
ENHANCED EDITION. Unit Contents. Section A: “He...
Chapter 12 Computer Programming
by cheryl-pisano
Chapter 12: Computer Programming. 2. Chapter Cont...
Joseph Tucek , Shan Lu, Chengdu Huang,
by danika-pritchard
Spiros. . Xanthos. . and . Yuanyuan. Zhou. Uni...
Load More...