CSC/ECE 517 Fall 2009: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 91: | Line 91: | ||
**[[CSC/ECE_517_Fall_2009/wiki3_10_ot|"Object Think" and other alternatives to CRC cards]] | **[[CSC/ECE_517_Fall_2009/wiki3_10_ot|"Object Think" and other alternatives to CRC cards]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_10_pz|"Object Think" and other alternatives to CRC cards]] | **[[CSC/ECE_517_Fall_2009/wiki3_10_pz|"Object Think" and other alternatives to CRC cards]] | ||
*'''Lecture 19''' | |||
**[[CSC/ECE_517_Fall_2009/wiki3_15_Programming_by_Assertions|Programming by Assertion]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_15_SJ3|Programming by Assertion]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_15_assertions|Programming by Assertion]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_20_i7|Liskov substitution principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_13_RS56|Principle of Explicit Interfaces]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_13_b5|Principle of Explicit Interfaces]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_13_ncs|Principle of Explicit Interfaces]] | |||
*'''Lecture 21''' | *'''Lecture 21''' | ||
**[[CSC/ECE_517_Fall_2009/wiki3_7_Agile|How can Agile complement other development methodologies?]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_7_dEaN|How can Agile complement other development methodologies?]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_7_f1|How can Agile complement other development methodologies?]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_11_HJ|Other agile methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki3_11_HJ|Other agile methodologies]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_11_ab|Other agile methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki3_11_ab|Other agile methodologies]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_11_j8|Other agile methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki3_11_j8|Other agile methodologies]] | ||
*'''Lecture 22''' | |||
**[[CSC/ECE_517_Fall_2009/wiki3_6_Factory_Design_Pattern|The Factory design pattern and its application]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_16_AD|Reuse/Release Equivalence Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_16_aa|Reuse/Release Equivalence Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_16_eit|Reuse/Release Equivalence Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_16_teamhelm|Reuse/Release Equivalence Principle]] | |||
*'''Lecture 23''' | |||
**[[CSC/ECE_517_Fall_2009/wiki3_21_MobileDesignPattern|Design Pattern for Mobile Applications]] | |||
*'''Lecture''' | *'''Lecture''' | ||
Line 101: | Line 133: | ||
**[[CSC/ECE_517_Fall_2009/wiki3_12_obj_to_relational|Patterns for mapping objects to relational databases]] | **[[CSC/ECE_517_Fall_2009/wiki3_12_obj_to_relational|Patterns for mapping objects to relational databases]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_12_sn|Patterns for mapping objects to relational databases]] | **[[CSC/ECE_517_Fall_2009/wiki3_12_sn|Patterns for mapping objects to relational databases]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_13_is|Principle of Self-Documentation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_14_12|Principle of Self-Documentation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_14_rd|Principle of Self-Documentation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_16_rn|Uniform access principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki319_SV|Uniform access principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_19_ee|Uniform access principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_19_rn|Uniform access principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_17_Single_Choice_Pattern_am|Single-Choice Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_17_VR|Single-Choice Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_17_am|Single-Choice Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_18_301|Stable Dependencies Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_18_sd|Stable Dependencies Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_3_cp|Common Closure Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_3_jn|Common Closure Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_ashi4|DRY principle for data]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_br|DRY principle for data]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_dt|DRY principle for data]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_5_SD|Dependency Inversion Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_5_rm|Dependency Inversion Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_8_ISPPSI|Interface Segregation Principle vs. Principle of Small Interfaces]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_8_agummad|Interface Segregation Principle vs. Principle of Small Interfaces]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_9_lkf|Non-Redundancy Principle]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_1_ab|Anti-patterns]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_1_co|Anti-patterns]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_1_kp|Anti-patterns]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_22_SN|Clone detection and clone manipulation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_2_SN|Clone detection and clone manipulation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_2_clone|Clone detection and clone manipulation]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_2_pp|Clone detection and clone manipulation]] |
Revision as of 22:20, 21 December 2009
Summary of pages done in Fall 2009
- Lecture 2
- Lecture 3
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Distributed Version Control
- Distributed Version Control
- Distributed Version Control
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- History of version control
- History of version control
- History of version control
- Lecture 4
- Ruby and Java from Security Perspective
- Ruby and Java from Security Perspective
- Ruby vs. Python
- Ruby vs. Python
- Ruby vs. Python
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- Scala vs. Ruby
- Resources for Ruby (other than IDEs)
- Resources for Ruby (other than IDEs)
- Ruby and Web security
- Ruby and Web security
- Lecture 5
- Regular expressions
- Regular expressions
- Regular expressions
- Regular expressions
- Testing frameworks for object-oriented languages
- Testing frameworks for object-oriented languages
- Static vs. dynamic o-o languages from the perspective of performance
- Static vs. dynamic o-o languages from the perspective of performance
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Lecture 6
- Lecture 9
- Lecture 14
- Lecture 19
- Lecture 21
- Lecture 23
- Lecture
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Principle of Self-Documentation
- Principle of Self-Documentation
- Principle of Self-Documentation
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Single-Choice Principle
- Single-Choice Principle
- Single-Choice Principle
- Stable Dependencies Principle
- Stable Dependencies Principle
- Common Closure Principle
- Common Closure Principle
- DRY principle for data
- DRY principle for data
- DRY principle for data
- Dependency Inversion Principle
- Dependency Inversion Principle
- Interface Segregation Principle vs. Principle of Small Interfaces
- Interface Segregation Principle vs. Principle of Small Interfaces
- Non-Redundancy Principle