CSC/ECE 517 Fall 2009: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 111: | Line 111: | ||
**[[CSC/ECE_517_Fall_2009/wiki2_1_SA|Metaprogramming]] | **[[CSC/ECE_517_Fall_2009/wiki2_1_SA|Metaprogramming]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_1_ma|Metaprogramming]] | **[[CSC/ECE_517_Fall_2009/wiki2_1_ma|Metaprogramming]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_13_StaticDynamic|Design patterns from a static/dynamic point of view]] | **[[CSC/ECE_517_Fall_2009/wiki2_13_StaticDynamic|Design patterns from a static/dynamic point of view]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_13_ncs|Design patterns from a static/dynamic point of view]] | **[[CSC/ECE_517_Fall_2009/wiki2_13_ncs|Design patterns from a static/dynamic point of view]] | ||
Line 169: | Line 165: | ||
**[[CSC/ECE_517_Fall_2009/wiki2_18_ee|Serialization Proxy pattern]] | **[[CSC/ECE_517_Fall_2009/wiki2_18_ee|Serialization Proxy pattern]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_18_i7|Serialization Proxy pattern]] | **[[CSC/ECE_517_Fall_2009/wiki2_18_i7|Serialization Proxy pattern]] | ||
**[[CSC/ECE_517_Fall_2009/wiki2_12_01|Schemes for patterns classification]] | |||
**[[CSC/ECE_517_Fall_2009/wiki2_12_PatternClassification|Schemes for patterns classification]] | |||
**[[CSC/ECE_517_Fall_2009/wiki2_12_Schemes_for_Pattern_Classification|Schemes for patterns classification]] | |||
**[[CSC/ECE_517_Fall_2009/wiki1b_12_Schemes_for_Pattern_Classification|Schemes for patterns classification]] | |||
*'''Topics not covered in the lectures''' | *'''Topics not covered in the lectures''' |
Revision as of 00:53, 22 December 2009
Summary of pages done in Fall 2009
- Lecture 2
- Lecture 3
- Categorization of refactorings
- Categorization of refactorings
- Categorization of refactorings
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Research in refactoring tools
- Distributed Version Control
- Distributed Version Control
- Distributed Version Control
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- Best practices for source-control management with version-control systems
- History of version control
- History of version control
- History of version control
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- Refactoring tools for Ruby and Ruby on Rails
- if-statement considered harmful
- if-statement considered harmful
- if-statement considered harmful
- if-statement considered harmful
- Lecture 4
- Ruby and Java from Security Perspective
- Ruby and Java from Security Perspective
- Ruby vs. Python
- Ruby vs. Python
- Ruby vs. Python
- Scala vs. Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- IDEs for Ruby
- Resources for Ruby (other than IDEs)
- Resources for Ruby (other than IDEs)
- Ruby and Web security
- Ruby and Web security
- Lecture 5
- Regular expressions
- Regular expressions
- Regular expressions
- Regular expressions
- Static vs. dynamic o-o languages from the perspective of performance
- Static vs. dynamic o-o languages from the perspective of performance
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Advantages of statically typed vs. dynamically typed languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Exception handling in o-o languages
- Lecture 7
- Lecture 9
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- Functional and integration testing and beyond
- GUI testing frameworks
- GUI testing frameworks
- GUI testing frameworks
- Testing frameworks for object-oriented languages
- Testing frameworks for object-oriented languages
- Lecture 10
- Lecture 11
- Lecture 12
- Lecture 13
- Lecture 14
- Lecture 15 and 16
- Lecture 19
- Lecture 21
- Lecture 22, 23, 24, 25
- Lecture 27
- Topics not covered in the lectures
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Patterns for mapping objects to relational databases
- Principle of Self-Documentation
- Principle of Self-Documentation
- Principle of Self-Documentation
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Uniform access principle
- Single-Choice Principle
- Single-Choice Principle
- Single-Choice Principle
- Stable Dependencies Principle
- Stable Dependencies Principle
- Common Closure Principle
- Common Closure Principle
- Dependency Inversion Principle
- Dependency Inversion Principle
- Interface Segregation Principle vs. Principle of Small Interfaces
- Interface Segregation Principle vs. Principle of Small Interfaces
- Non-Redundancy Principle
- Non-Redundancy Principle
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Survey "Driven Development" Methodologies
- Thread-safe programming and concurrency patterns
- Thread-safe programming and concurrency patterns
- Anti-patterns
- Anti-patterns
- Anti-patterns
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Clone detection and clone manipulation
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Mock Objects and Mock frameworks
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Principle of Explicit Interfaces
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Reuse/Release Equivalence Principle
- Synchronizer token pattern
- Synchronizer token pattern
- Synchronizer token pattern