CSC/ECE 517 Fall 2009: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 223: | Line 223: | ||
*''' | *'''Topics not covered in the lectures''' | ||
**[[CSC/ECE_517_Fall_2009/wiki3_12_Patterns_for_ORM|Patterns for mapping objects to relational databases]] | **[[CSC/ECE_517_Fall_2009/wiki3_12_Patterns_for_ORM|Patterns for mapping objects to relational databases]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_12_obj_to_relational|Patterns for mapping objects to relational databases]] | **[[CSC/ECE_517_Fall_2009/wiki3_12_obj_to_relational|Patterns for mapping objects to relational databases]] | ||
Line 250: | Line 250: | ||
**[[CSC/ECE_517_Fall_2009/wiki3_9_lkf|Non-Redundancy Principle]] | **[[CSC/ECE_517_Fall_2009/wiki3_9_lkf|Non-Redundancy Principle]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_9_rp|Non-Redundancy Principle]] | **[[CSC/ECE_517_Fall_2009/wiki3_9_rp|Non-Redundancy Principle]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_19_aa|Survey "Driven Development" Methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki2_19_aa|Survey "Driven Development" Methodologies]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_19_as|Survey "Driven Development" Methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki2_19_as|Survey "Driven Development" Methodologies]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_6_TDD|Survey "Driven Development" Methodologies]] | **[[CSC/ECE_517_Fall_2009/wiki2_6_TDD|Survey "Driven Development" Methodologies]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_14_conc_patterns|Thread-safe programming and concurrency patterns]] | **[[CSC/ECE_517_Fall_2009/wiki2_14_conc_patterns|Thread-safe programming and concurrency patterns]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_14_san|Thread-safe programming and concurrency patterns]] | **[[CSC/ECE_517_Fall_2009/wiki2_14_san|Thread-safe programming and concurrency patterns]] |
Revision as of 00:03, 22 December 2009
Summary of pages done in Fall 2009
- Lecture 2
- Lecture 3
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Distributed Version Control
- Distributed Version Control
- Distributed Version Control
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- History of version control
- History of version control
- History of version control
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Research in refactoring tools
- Lecture 4
- Ruby and Java from Security Perspective
- Ruby and Java from Security Perspective
- Ruby vs. Python
- Ruby vs. Python
- Ruby vs. Python
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- Scala vs. Ruby
- Resources for Ruby (other than IDEs)
- Resources for Ruby (other than IDEs)
- Ruby and Web security
- Ruby and Web security
- Lecture 5
- Regular expressions
- Regular expressions
- Regular expressions
- Regular expressions
- Testing frameworks for object-oriented languages
- Testing frameworks for object-oriented languages
- Static vs. dynamic o-o languages from the perspective of performance
- Static vs. dynamic o-o languages from the perspective of performance
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Lecture 6
- Lecture 7
- Lecture 9
- Lecture 10
- Lecture 11
- Lecture 12
- Lecture 13
- Lecture 14
- Lecture 15 and 16
- Lecture 19
- Lecture 21
- Lecture 22
- Lecture 23
- Topics not covered in the lectures
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Principle of Self-Documentation
- Principle of Self-Documentation
- Principle of Self-Documentation
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Single-Choice Principle
- Single-Choice Principle
- Single-Choice Principle
- Stable Dependencies Principle
- Stable Dependencies Principle
- Common Closure Principle
- Common Closure Principle
- DRY principle for data
- DRY principle for data
- DRY principle for data
- Dependency Inversion Principle
- Dependency Inversion Principle
- Interface Segregation Principle vs. Principle of Small Interfaces
- Interface Segregation Principle vs. Principle of Small Interfaces
- Non-Redundancy Principle
- Non-Redundancy Principle
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Thread-safe programming and concurrency patterns
- Thread-safe programming and concurrency patterns
- Anti-patterns
- Anti-patterns
- Anti-patterns
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation