CSC/ECE 517 Fall 2009: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 146: | Line 146: | ||
**[[CSC/ECE_517_Fall_2009/wiki3_sskm|Programming by Assertion]] | **[[CSC/ECE_517_Fall_2009/wiki3_sskm|Programming by Assertion]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_20_i7|Liskov substitution principle]] | **[[CSC/ECE_517_Fall_2009/wiki3_20_i7|Liskov substitution principle]] | ||
*'''Lecture 20''' | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_ashi4|DRY principle for data]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_br|DRY principle for data]] | |||
**[[CSC/ECE_517_Fall_2009/wiki3_4_dt|DRY principle for data]] | |||
*'''Lecture 21''' | *'''Lecture 21''' | ||
Line 161: | Line 167: | ||
**[[CSC/ECE_517_Fall_2009/wiki2_11_zv|Other design patterns in Ruby]] | **[[CSC/ECE_517_Fall_2009/wiki2_11_zv|Other design patterns in Ruby]] | ||
**[[CSC/ECE_517_Fall_2009/wiki3_21_MobileDesignPattern|Design Pattern for Mobile Applications]] | **[[CSC/ECE_517_Fall_2009/wiki3_21_MobileDesignPattern|Design Pattern for Mobile Applications]] | ||
*'''Lecture 27''' | *'''Lecture 27''' |
Revision as of 00:37, 22 December 2009
Summary of pages done in Fall 2009
- Lecture 2
- Lecture 3
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Distributed Version Control
- Distributed Version Control
- Distributed Version Control
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- History of version control
- History of version control
- History of version control
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Lecture 4
- Ruby and Java from Security Perspective
- Ruby and Java from Security Perspective
- Ruby vs. Python
- Ruby vs. Python
- Ruby vs. Python
- Scala vs. Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- Resources for Ruby (other than IDEs)
- Resources for Ruby (other than IDEs)
- Ruby and Web security
- Ruby and Web security
- Lecture 5
- Regular expressions
- Regular expressions
- Regular expressions
- Regular expressions
- Static vs. dynamic o-o languages from the perspective of performance
- Static vs. dynamic o-o languages from the perspective of performance
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Lecture 7
- Lecture 9
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- GUI testing frameworks
- GUI testing frameworks
- GUI testing frameworks
- Testing frameworks for object-oriented languages
- Testing frameworks for object-oriented languages
- Lecture 10
- Lecture 11
- Lecture 12
- Aspect-Oriented Programming
- Aspect-Oriented Programming
- Aspect-Oriented Programming
- Metaprogramming
- Metaprogramming
- Metaprogramming
- Schemes for patterns classification
- Schemes for patterns classification
- Schemes for patterns classification
- Schemes for patterns classification
- Design patterns from a static/dynamic point of view
- Design patterns from a static/dynamic point of view
- Lecture 13
- Lecture 14
- Lecture 15 and 16
- Lecture 19
- Lecture 21
- Lecture 22, 23, 24, 25
- Topics not covered in the lectures
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Principle of Self-Documentation
- Principle of Self-Documentation
- Principle of Self-Documentation
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Single-Choice Principle
- Single-Choice Principle
- Single-Choice Principle
- Stable Dependencies Principle
- Stable Dependencies Principle
- Common Closure Principle
- Common Closure Principle
- Dependency Inversion Principle
- Dependency Inversion Principle
- Interface Segregation Principle vs. Principle of Small Interfaces
- Interface Segregation Principle vs. Principle of Small Interfaces
- Non-Redundancy Principle
- Non-Redundancy Principle
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Thread-safe programming and concurrency patterns
- Thread-safe programming and concurrency patterns
- Anti-patterns
- Anti-patterns
- Anti-patterns
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle