CSC/ECE 517 Fall 2009: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 123: | Line 123: | ||
**[[CSC/ECE_517_Fall_2009/wiki2_16_rs|Service Oriented Architecture(SOA) and Patterns]] | **[[CSC/ECE_517_Fall_2009/wiki2_16_rs|Service Oriented Architecture(SOA) and Patterns]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_16_tvhi|Service Oriented Architecture(SOA) and Patterns]] | **[[CSC/ECE_517_Fall_2009/wiki2_16_tvhi|Service Oriented Architecture(SOA) and Patterns]] | ||
*'''Lecture 14''' | *'''Lecture 14''' | ||
Line 220: | Line 217: | ||
**[[CSC/ECE_517_Fall_2009/wiki3_16_eit|Reuse/Release Equivalence Principle]] | **[[CSC/ECE_517_Fall_2009/wiki3_16_eit|Reuse/Release Equivalence Principle]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_16_teamhelm|Reuse/Release Equivalence Principle]] | **[[CSC/ECE_517_Fall_2009/wiki3_16_teamhelm|Reuse/Release Equivalence Principle]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_3_b5|Synchronizer token pattern]] | |||
**[[CSC/ECE_517_Fall_2009/wiki2_3_bd|Synchronizer token pattern]] | |||
**[[CSC/ECE_517_Fall_2009/wiki2_3_pp|Synchronizer token pattern]] |
Revision as of 00:44, 22 December 2009
Summary of pages done in Fall 2009
- Lecture 2
- Lecture 3
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Distributed Version Control
- Distributed Version Control
- Distributed Version Control
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- History of version control
- History of version control
- History of version control
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- if-statement considered harmful
- if-statement considered harmful
- if-statement considered harmful
- if-statement considered harmful
- Lecture 4
- Ruby and Java from Security Perspective
- Ruby and Java from Security Perspective
- Ruby vs. Python
- Ruby vs. Python
- Ruby vs. Python
- Scala vs. Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- Resources for Ruby (other than IDEs)
- Resources for Ruby (other than IDEs)
- Ruby and Web security
- Ruby and Web security
- Lecture 5
- Regular expressions
- Regular expressions
- Regular expressions
- Regular expressions
- Static vs. dynamic o-o languages from the perspective of performance
- Static vs. dynamic o-o languages from the perspective of performance
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Lecture 7
- Lecture 9
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- GUI testing frameworks
- GUI testing frameworks
- GUI testing frameworks
- Testing frameworks for object-oriented languages
- Testing frameworks for object-oriented languages
- Lecture 10
- Lecture 11
- Lecture 12
- Aspect-Oriented Programming
- Aspect-Oriented Programming
- Aspect-Oriented Programming
- Metaprogramming
- Metaprogramming
- Metaprogramming
- Schemes for patterns classification
- Schemes for patterns classification
- Schemes for patterns classification
- Schemes for patterns classification
- Design patterns from a static/dynamic point of view
- Design patterns from a static/dynamic point of view
- Lecture 13
- Lecture 14
- Lecture 15 and 16
- Lecture 19
- Lecture 21
- Lecture 22, 23, 24, 25
- Topics not covered in the lectures
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Principle of Self-Documentation
- Principle of Self-Documentation
- Principle of Self-Documentation
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Single-Choice Principle
- Single-Choice Principle
- Single-Choice Principle
- Stable Dependencies Principle
- Stable Dependencies Principle
- Common Closure Principle
- Common Closure Principle
- Dependency Inversion Principle
- Dependency Inversion Principle
- Interface Segregation Principle vs. Principle of Small Interfaces
- Interface Segregation Principle vs. Principle of Small Interfaces
- Non-Redundancy Principle
- Non-Redundancy Principle
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Thread-safe programming and concurrency patterns
- Thread-safe programming and concurrency patterns
- Anti-patterns
- Anti-patterns
- Anti-patterns
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Synchronizer token pattern
- Synchronizer token pattern
- Synchronizer token pattern