„coding“
Suchergebnisse
10.000+ Treffer
-
Python for Beginners: – Learn Coding Basics, Build Projects, and Prepare for Tech Jobs with Easy Python Lessons
-
Browser Tasks Automation: – Automate Repetitive Online Tasks with AI Tools, Extensions, and Scripts — No Coding Needed
-
How to Start Coding for Beginners: – Easy, No-Jargon Introduction to Programming Concepts and Practical Skills
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part III
-
Religious and spiritual experiences from a neuroscientific and complex systems perspective
-
How to Develop Apps with ChatGPT: – Build and Launch AI-Powered Apps Without Coding Using ChatGPT and No-Code Tools
-
Schmerzmessung bei früh- und reifgeborenen Neugeborenen im klinischen Alltag : Ein Vergleich des Neonatal Facial Coding System (NFCSshort) und des Premature Infant Pain Profile (PIPP)
-
C Programming for Absolute Beginners: – Learn the Basics of Coding, Algorithms, and Software Development with Easy C Language Lessons
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part V
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VIII
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part IV
-
Algorithms for Beginners: – Learn Algorithmic Thinking, Data Structures, and Problem-Solving for Coding Interviews and Tech Careers
-
Predictive goal coding by dentate gyrus somatostatin-expressing interneurons in male mice
-
Error Correction Coding – Mathematical Methods and Algorithms
-
Algebraic Coding Theory and Applications
-
Advances in Multimedia Information Processing – PCM 2012 – 13th Pacific-Rim Conference on Multimedia, Singapore, December 4-6, 2012. Proceedings
-
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
-
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
-
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
-
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction