Long pages

From CSSEMediaWiki
Jump to: navigation, search

Showing below up to 250 results starting with #51.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Guitar Tutor Report ‎[8,779 bytes]
  2. (hist) ‎Poker Simulator Design Log ‎[8,729 bytes]
  3. (hist) ‎One hour tour ‎[7,751 bytes]
  4. (hist) ‎DMA Design Project - first submission ‎[7,745 bytes]
  5. (hist) ‎Software reuse ‎[7,696 bytes]
  6. (hist) ‎Martin Fowler 2003 ‎[7,526 bytes]
  7. (hist) ‎Refactoring and performance ‎[7,512 bytes]
  8. (hist) ‎DMA Design Project first draft ‎[7,369 bytes]
  9. (hist) ‎Encapsulate Collection ‎[7,224 bytes]
  10. (hist) ‎Coupling and cohesion ‎[7,140 bytes]
  11. (hist) ‎Party of five 1996 ‎[7,034 bytes]
  12. (hist) ‎Joshua Bloch 2006 Bumper Sticker API Design ‎[7,020 bytes]
  13. (hist) ‎427 design standard ‎[6,699 bytes]
  14. (hist) ‎Observer ‎[6,640 bytes]
  15. (hist) ‎2006 Exam answers ‎[6,595 bytes]
  16. (hist) ‎Prototype ‎[6,221 bytes]
  17. (hist) ‎RL Design Study Log ‎[6,055 bytes]
  18. (hist) ‎Professionalism ‎[5,845 bytes]
  19. (hist) ‎Refactoring ‎[5,822 bytes]
  20. (hist) ‎Model view controller ‎[5,740 bytes]
  21. (hist) ‎Composite ‎[5,437 bytes]
  22. (hist) ‎Strategy ‎[5,359 bytes]
  23. (hist) ‎Abstract Factory ‎[5,148 bytes]
  24. (hist) ‎Observations and Measurements ‎[5,113 bytes]
  25. (hist) ‎Liskov substitution principle ‎[4,997 bytes]
  26. (hist) ‎Visitor ‎[4,916 bytes]
  27. (hist) ‎2007 Exam answers ‎[4,882 bytes]
  28. (hist) ‎HistoryCrumbs.user.js ‎[4,880 bytes]
  29. (hist) ‎Analysis patterns ‎[4,875 bytes]
  30. (hist) ‎Antipatterns ‎[4,871 bytes]
  31. (hist) ‎Mujtaba's Log ‎[4,859 bytes]
  32. (hist) ‎Accountability ‎[4,842 bytes]
  33. (hist) ‎Command query separation ‎[4,800 bytes]
  34. (hist) ‎Project ideas ‎[4,749 bytes]
  35. (hist) ‎Design by contract ‎[4,723 bytes]
  36. (hist) ‎Are you gonna eat that ‎[4,643 bytes]
  37. (hist) ‎Similar patterns and how to tell them apart ‎[4,620 bytes]
  38. (hist) ‎Flyweight ‎[4,505 bytes]
  39. (hist) ‎Mediator ‎[4,445 bytes]
  40. (hist) ‎Design maxims ‎[4,442 bytes]
  41. (hist) ‎Adapter ‎[4,377 bytes]
  42. (hist) ‎Refactoring and design ‎[4,368 bytes]
  43. (hist) ‎Command ‎[4,367 bytes]
  44. (hist) ‎Law of Demeter ‎[4,356 bytes]
  45. (hist) ‎Factory Method ‎[4,294 bytes]
  46. (hist) ‎Getters and setters ‎[4,193 bytes]
  47. (hist) ‎Automation ‎[4,185 bytes]
  48. (hist) ‎427 assessment ‎[4,119 bytes]
  49. (hist) ‎Decorator ‎[4,065 bytes]
  50. (hist) ‎Frogs second design ‎[4,043 bytes]
  51. (hist) ‎PluS XML format ‎[4,008 bytes]
  52. (hist) ‎David Parnas ‎[3,981 bytes]
  53. (hist) ‎Use lazy initialization pattern ‎[3,932 bytes]
  54. (hist) ‎Iterator ‎[3,823 bytes]
  55. (hist) ‎BenjaminTaylor Previous Design Work ‎[3,798 bytes]
  56. (hist) ‎Memento ‎[3,795 bytes]
  57. (hist) ‎Advice from alumni ‎[3,782 bytes]
  58. (hist) ‎Object-oriented design anti-patterns ‎[3,725 bytes]
  59. (hist) ‎Singleton ‎[3,672 bytes]
  60. (hist) ‎Equals vs the Encapsulation Boundary ‎[3,664 bytes]
  61. (hist) ‎Avoid concrete base classes ‎[3,658 bytes]
  62. (hist) ‎Decomposition ‎[3,657 bytes]
  63. (hist) ‎Java Collections Framework ‎[3,480 bytes]
  64. (hist) ‎Bridge ‎[3,429 bytes]
  65. (hist) ‎William Brown 1998 ‎[3,426 bytes]
  66. (hist) ‎Template Method ‎[3,411 bytes]
  67. (hist) ‎Teaching and learning style ‎[3,347 bytes]
  68. (hist) ‎Proxy ‎[3,342 bytes]
  69. (hist) ‎Comments and suggestions ‎[3,321 bytes]
  70. (hist) ‎Jojo's OO Design Project Log ‎[3,317 bytes]
  71. (hist) ‎Ken Auer 1995 ‎[3,282 bytes]
  72. (hist) ‎Don't expose mutable attributes ‎[3,259 bytes]
  73. (hist) ‎OO tools ‎[3,243 bytes]
  74. (hist) ‎Greg Searle's project blackjack ‎[3,145 bytes]
  75. (hist) ‎State ‎[3,126 bytes]
  76. (hist) ‎Stable abstractions principle ‎[3,084 bytes]
  77. (hist) ‎Facade ‎[3,029 bytes]
  78. (hist) ‎Favour containment over association ‎[3,026 bytes]
  79. (hist) ‎Builder ‎[2,955 bytes]
  80. (hist) ‎Avoid mixing inputs and outputs ‎[2,891 bytes]
  81. (hist) ‎Design patterns break rules ‎[2,867 bytes]
  82. (hist) ‎Organisational patterns ‎[2,862 bytes]
  83. (hist) ‎Interface segregation principle ‎[2,856 bytes]
  84. (hist) ‎Code smells ‎[2,842 bytes]
  85. (hist) ‎Test Driven Development ‎[2,825 bytes]
  86. (hist) ‎Interpreter ‎[2,774 bytes]
  87. (hist) ‎Scrum ‎[2,758 bytes]
  88. (hist) ‎Beware type switches ‎[2,728 bytes]
  89. (hist) ‎Eliminate irrelevant classes ‎[2,719 bytes]
  90. (hist) ‎Ken Auer ‎[2,711 bytes]
  91. (hist) ‎Avoid equals ‎[2,698 bytes]
  92. (hist) ‎Combining design patterns ‎[2,693 bytes]
  93. (hist) ‎Dependency inversion principle ‎[2,691 bytes]
  94. (hist) ‎Single responsibility principle ‎[2,663 bytes]
  95. (hist) ‎A froggy visitor ‎[2,592 bytes]
  96. (hist) ‎Defer identification of state variables pattern ‎[2,591 bytes]
  97. (hist) ‎Big ball of mud ‎[2,574 bytes]
  98. (hist) ‎Tell, don't ask ‎[2,546 bytes]
  99. (hist) ‎Enum idiom ‎[2,528 bytes]
  100. (hist) ‎Premature optimization ‎[2,525 bytes]
  101. (hist) ‎Peer To Peer ‎[2,524 bytes]
  102. (hist) ‎Christopher Alexander 1977 ‎[2,524 bytes]
  103. (hist) ‎Johnson and Foote 1988 ‎[2,522 bytes]
  104. (hist) ‎Open closed principle ‎[2,522 bytes]
  105. (hist) ‎Patterns ‎[2,508 bytes]
  106. (hist) ‎Dependency injection ‎[2,504 bytes]
  107. (hist) ‎Encapsulate concrete state pattern ‎[2,461 bytes]
  108. (hist) ‎Hide data within its class ‎[2,445 bytes]
  109. (hist) ‎Acyclic dependencies principle ‎[2,437 bytes]
  110. (hist) ‎What is Bad Design ‎[2,428 bytes]
  111. (hist) ‎BaseBean ‎[2,415 bytes]
  112. (hist) ‎Design maxims Equivalence ‎[2,376 bytes]
  113. (hist) ‎Introduction to the Terrain Renderer ‎[2,337 bytes]
  114. (hist) ‎Circle-ellipse problem ‎[2,313 bytes]
  115. (hist) ‎Impedance mismatch ‎[2,304 bytes]
  116. (hist) ‎Maxim Hierarchy ‎[2,297 bytes]
  117. (hist) ‎Define classes by behavior, not state pattern ‎[2,259 bytes]
  118. (hist) ‎Why refactoring works ‎[2,188 bytes]
  119. (hist) ‎Template view pattern ‎[2,178 bytes]
  120. (hist) ‎Aggregation versus Composition ‎[2,176 bytes]
  121. (hist) ‎Trains design ‎[2,147 bytes]
  122. (hist) ‎Sequential coupling ‎[2,110 bytes]
  123. (hist) ‎Rebecca Wirfs-Brock ‎[2,081 bytes]
  124. (hist) ‎Empty method over-rides ‎[2,056 bytes]
  125. (hist) ‎Call super ‎[2,053 bytes]
  126. (hist) ‎Multiple Inheritance ‎[2,051 bytes]
  127. (hist) ‎Encapsulation ‎[2,025 bytes]
  128. (hist) ‎Chain of Responsibility ‎[2,016 bytes]
  129. (hist) ‎Video rental system ‎[2,010 bytes]
  130. (hist) ‎Information hiding ‎[2,008 bytes]
  131. (hist) ‎Object cesspool ‎[2,003 bytes]
  132. (hist) ‎Anemic Domain Model ‎[1,989 bytes]
  133. (hist) ‎Object pool ‎[1,987 bytes]
  134. (hist) ‎Model classes not roles ‎[1,976 bytes]
  135. (hist) ‎Avoid downcasting ‎[1,948 bytes]
  136. (hist) ‎Properties / Fields / Attributes ‎[1,943 bytes]
  137. (hist) ‎Sorcerers design ‎[1,924 bytes]
  138. (hist) ‎Barbara Liskov ‎[1,915 bytes]
  139. (hist) ‎Unit Test ‎[1,898 bytes]
  140. (hist) ‎Strategy meets Template ‎[1,886 bytes]
  141. (hist) ‎Implement behavior with abstract state pattern ‎[1,885 bytes]
  142. (hist) ‎Super quick exam ref ‎[1,867 bytes]
  143. (hist) ‎Don't burn your base class ‎[1,865 bytes]
  144. (hist) ‎Architectural patterns ‎[1,861 bytes]
  145. (hist) ‎Alumni ‎[1,860 bytes]
  146. (hist) ‎Keep last years stuff ‎[1,830 bytes]
  147. (hist) ‎Monsters design ‎[1,825 bytes]
  148. (hist) ‎Circular dependency ‎[1,774 bytes]
  149. (hist) ‎Transform view pattern ‎[1,771 bytes]
  150. (hist) ‎Do the simplest thing that could possibly work ‎[1,761 bytes]
  151. (hist) ‎Encapsulation is hierarchical ‎[1,757 bytes]
  152. (hist) ‎Named constants ‎[1,743 bytes]
  153. (hist) ‎Reuse release equivalence principle ‎[1,741 bytes]
  154. (hist) ‎Feature envy smell ‎[1,732 bytes]
  155. (hist) ‎Double Dispatch ‎[1,723 bytes]
  156. (hist) ‎One Into Many ‎[1,691 bytes]
  157. (hist) ‎Abstract vs Interface ‎[1,675 bytes]
  158. (hist) ‎Party of Five 1996 ‎[1,671 bytes]
  159. (hist) ‎Tanmay's Log ‎[1,670 bytes]
  160. (hist) ‎Avoid protected data ‎[1,654 bytes]
  161. (hist) ‎Wiki users ‎[1,635 bytes]
  162. (hist) ‎OO wisdom ‎[1,625 bytes]
  163. (hist) ‎Christopher Alexander ‎[1,618 bytes]
  164. (hist) ‎OO culture ‎[1,608 bytes]
  165. (hist) ‎Avoid side effects ‎[1,584 bytes]
  166. (hist) ‎Factor implementation differences into subcomponents ‎[1,563 bytes]
  167. (hist) ‎Lazy load pattern ‎[1,541 bytes]
  168. (hist) ‎Martin Fowler 1999 ‎[1,540 bytes]
  169. (hist) ‎Bob Martin ‎[1,539 bytes]
  170. (hist) ‎Hierarchical Model View Controller ‎[1,528 bytes]
  171. (hist) ‎Identify message layers pattern ‎[1,518 bytes]
  172. (hist) ‎Contained objects should not use each other ‎[1,516 bytes]
  173. (hist) ‎God object ‎[1,506 bytes]
  174. (hist) ‎Extreme programming ‎[1,499 bytes]
  175. (hist) ‎Jason's Useful Links Page ‎[1,497 bytes]
  176. (hist) ‎Constant interface ‎[1,496 bytes]
  177. (hist) ‎Subclasses should be specializations ‎[1,491 bytes]
  178. (hist) ‎Recursion introduction ‎[1,471 bytes]
  179. (hist) ‎Johnson and Foote's heuristics ‎[1,468 bytes]
  180. (hist) ‎Table module pattern ‎[1,454 bytes]
  181. (hist) ‎Introduce Null Object ‎[1,450 bytes]
  182. (hist) ‎Beware value switches ‎[1,445 bytes]
  183. (hist) ‎Model the real world ‎[1,442 bytes]
  184. (hist) ‎Reinvent the wheel ‎[1,439 bytes]
  185. (hist) ‎Minimal public interface ‎[1,431 bytes]
  186. (hist) ‎2009 frog design criticisms ‎[1,428 bytes]
  187. (hist) ‎Avoid multiple inheritance ‎[1,428 bytes]
  188. (hist) ‎Andrew Hunt 1999 ‎[1,425 bytes]
  189. (hist) ‎Hall of fame ‎[1,381 bytes]
  190. (hist) ‎Long parameter list smell ‎[1,380 bytes]
  191. (hist) ‎PLoP (Software Patterns Series) ‎[1,374 bytes]
  192. (hist) ‎Polymorphism ‎[1,372 bytes]
  193. (hist) ‎Transaction script pattern ‎[1,371 bytes]
  194. (hist) ‎Service layer pattern ‎[1,369 bytes]
  195. (hist) ‎Exam Quick Reference ‎[1,354 bytes]
  196. (hist) ‎Poltergeists ‎[1,348 bytes]
  197. (hist) ‎Common closure principle ‎[1,345 bytes]
  198. (hist) ‎Domain model pattern ‎[1,337 bytes]
  199. (hist) ‎Data class smell ‎[1,333 bytes]
  200. (hist) ‎Wals library ‎[1,315 bytes]
  201. (hist) ‎Presentation Abstraction Control ‎[1,309 bytes]
  202. (hist) ‎Arthur Riel 1996 ‎[1,301 bytes]
  203. (hist) ‎Avoid no-op overrides ‎[1,295 bytes]
  204. (hist) ‎Bob Martin's principles ‎[1,289 bytes]
  205. (hist) ‎Message chain smell ‎[1,287 bytes]
  206. (hist) ‎Don't repeat yourself ‎[1,285 bytes]
  207. (hist) ‎Separate non-communicating behaviour ‎[1,283 bytes]
  208. (hist) ‎Class hierarchies should be deep and narrow ‎[1,281 bytes]
  209. (hist) ‎Long method smell ‎[1,281 bytes]
  210. (hist) ‎Stable dependencies principle ‎[1,280 bytes]
  211. (hist) ‎No silver bullet ‎[1,274 bytes]
  212. (hist) ‎Ward's wiki ‎[1,274 bytes]
  213. (hist) ‎Kent Beck ‎[1,273 bytes]
  214. (hist) ‎Common reuse principle ‎[1,254 bytes]
  215. (hist) ‎A class should not depend on its users ‎[1,253 bytes]
  216. (hist) ‎Reduce implicit parameter passing ‎[1,247 bytes]
  217. (hist) ‎Stovepipe system ‎[1,246 bytes]
  218. (hist) ‎The top of the class hierarchy should be abstract ‎[1,241 bytes]
  219. (hist) ‎Method ‎[1,232 bytes]
  220. (hist) ‎Michael's Log ‎[1,229 bytes]
  221. (hist) ‎Class versus Object ‎[1,229 bytes]
  222. (hist) ‎Parallel hierarchies problem ‎[1,229 bytes]
  223. (hist) ‎Fat interfaces ‎[1,227 bytes]
  224. (hist) ‎Martin Fowler ‎[1,226 bytes]
  225. (hist) ‎You ain't gonna need it ‎[1,221 bytes]
  226. (hist) ‎Schools of thought ‎[1,217 bytes]
  227. (hist) ‎Methods should use most fields of a class ‎[1,207 bytes]
  228. (hist) ‎GenericGuidelines ‎[1,206 bytes]
  229. (hist) ‎Blackboard System ‎[1,199 bytes]
  230. (hist) ‎Avoid becomes ‎[1,180 bytes]
  231. (hist) ‎Replace Parameter with Method ‎[1,176 bytes]
  232. (hist) ‎Getter and setter policy ‎[1,165 bytes]
  233. (hist) ‎Behavioral completeness ‎[1,165 bytes]
  234. (hist) ‎Amelioration patterns ‎[1,161 bytes]
  235. (hist) ‎Encapsulate that which varies ‎[1,160 bytes]
  236. (hist) ‎Swiss army knife ‎[1,150 bytes]
  237. (hist) ‎Wal's Fish Tank ‎[1,149 bytes]
  238. (hist) ‎Avoid inheritance for optional containment ‎[1,140 bytes]
  239. (hist) ‎Shalloway and Trott 2002 ‎[1,137 bytes]
  240. (hist) ‎Big design up front ‎[1,136 bytes]
  241. (hist) ‎Shallow VS Deep Copy ‎[1,134 bytes]
  242. (hist) ‎Object orgy ‎[1,121 bytes]
  243. (hist) ‎Extract Method ‎[1,121 bytes]
  244. (hist) ‎AudioSystems ‎[1,118 bytes]
  245. (hist) ‎Limit hierarchy depth ‎[1,114 bytes]
  246. (hist) ‎Avoid verb classes ‎[1,113 bytes]
  247. (hist) ‎Data clumps smell ‎[1,107 bytes]
  248. (hist) ‎Start here ‎[1,104 bytes]
  249. (hist) ‎Avoid god classes ‎[1,102 bytes]
  250. (hist) ‎Intelligent children pattern ‎[1,098 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox