Short pages

From CSSEMediaWiki
Jump to: navigation, search

Showing below up to 100 results starting with #1.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎John Hofman US001 ‎[0 bytes]
  2. (hist) ‎John Hofman's Log ‎[0 bytes]
  3. (hist) ‎Jenny Harlow ‎[0 bytes]
  4. (hist) ‎Put semantic constraints in class definition ‎[12 bytes]
  5. (hist) ‎Put semantic constraints in constructors ‎[13 bytes]
  6. (hist) ‎Different Design ‎[33 bytes]
  7. (hist) ‎Beware accessors ‎[37 bytes]
  8. (hist) ‎Kris's Design Study ‎[69 bytes]
  9. (hist) ‎Bertrand Meyer ‎[70 bytes]
  10. (hist) ‎Arthur Riel ‎[99 bytes]
  11. (hist) ‎Lecture sequence ‎[111 bytes]
  12. (hist) ‎Instance ‎[113 bytes]
  13. (hist) ‎State machine design ‎[141 bytes]
  14. (hist) ‎Joshua Bloch ‎[148 bytes]
  15. (hist) ‎Real name ‎[159 bytes]
  16. (hist) ‎Vehicles and operators design ‎[166 bytes]
  17. (hist) ‎Designfest ‎[169 bytes]
  18. (hist) ‎Remove Middle Man ‎[171 bytes]
  19. (hist) ‎Superclass ‎[177 bytes]
  20. (hist) ‎Parallel inheritance hierarchies smell ‎[182 bytes]
  21. (hist) ‎Robert Cecil Martin 1996c ‎[190 bytes]
  22. (hist) ‎Robert Cecil Martin 1996d ‎[191 bytes]
  23. (hist) ‎Push Down Field ‎[191 bytes]
  24. (hist) ‎Encapsulate Downcast ‎[193 bytes]
  25. (hist) ‎Ward and Kent ‎[195 bytes]
  26. (hist) ‎Managing complexity ‎[201 bytes]
  27. (hist) ‎Inheritance for specialization ‎[206 bytes]
  28. (hist) ‎Push Down Method ‎[216 bytes]
  29. (hist) ‎Change Reference to Value ‎[226 bytes]
  30. (hist) ‎Idioms ‎[232 bytes]
  31. (hist) ‎Separate Query from Modifier ‎[232 bytes]
  32. (hist) ‎Pull Up Constructor Body ‎[235 bytes]
  33. (hist) ‎Robert Cecil Martin 1997a ‎[246 bytes]
  34. (hist) ‎Favour deep hierarchies ‎[248 bytes]
  35. (hist) ‎Toast ‎[248 bytes]
  36. (hist) ‎Serialization ‎[257 bytes]
  37. (hist) ‎Hide your decisions ‎[273 bytes]
  38. (hist) ‎Robert Cecil Martin 1996e ‎[274 bytes]
  39. (hist) ‎Establishing priorities ‎[274 bytes]
  40. (hist) ‎Citation needed ‎[277 bytes]
  41. (hist) ‎Extract Hierarchy ‎[282 bytes]
  42. (hist) ‎Reusable frameworks over reusable components ‎[284 bytes]
  43. (hist) ‎Referring to Objects ‎[285 bytes]
  44. (hist) ‎Do not change the state of an object without going through its public interface ‎[287 bytes]
  45. (hist) ‎Pull Up Method ‎[287 bytes]
  46. (hist) ‎Hide Method ‎[287 bytes]
  47. (hist) ‎Replace Conditional with Polymorphism ‎[288 bytes]
  48. (hist) ‎Robert Cecil Martin 1996a ‎[299 bytes]
  49. (hist) ‎GenA: A Genetic Algorithms Framework ‎[307 bytes]
  50. (hist) ‎Robert Cecil Martin 2002 ‎[314 bytes]
  51. (hist) ‎Joff's Place ‎[316 bytes]
  52. (hist) ‎Make all Member Variables Private ‎[316 bytes]
  53. (hist) ‎List of OO Languages ‎[317 bytes]
  54. (hist) ‎Vendor lock-in ‎[318 bytes]
  55. (hist) ‎Exam questions ‎[322 bytes]
  56. (hist) ‎Extract Interface ‎[322 bytes]
  57. (hist) ‎Remove Parameter ‎[330 bytes]
  58. (hist) ‎Move methods ‎[334 bytes]
  59. (hist) ‎No Global Variables ‎[336 bytes]
  60. (hist) ‎Pull Up Field ‎[336 bytes]
  61. (hist) ‎Make constructors blocking ‎[338 bytes]
  62. (hist) ‎Replace Parameter with Explicit Methods ‎[342 bytes]
  63. (hist) ‎Erich Gamma ‎[344 bytes]
  64. (hist) ‎Remove Setting Method ‎[345 bytes]
  65. (hist) ‎Collapse Hierarchy ‎[345 bytes]
  66. (hist) ‎Replace Inheritance with Delegation ‎[348 bytes]
  67. (hist) ‎Extract Subclass ‎[351 bytes]
  68. (hist) ‎Keep accessors and mutators separate ‎[359 bytes]
  69. (hist) ‎Robert Cecil Martin 1997b ‎[360 bytes]
  70. (hist) ‎Move Method ‎[361 bytes]
  71. (hist) ‎Replace Constructor with Factory Method ‎[361 bytes]
  72. (hist) ‎Replace Data Value with Object ‎[365 bytes]
  73. (hist) ‎Inline Class ‎[366 bytes]
  74. (hist) ‎Introduce Local Extension ‎[378 bytes]
  75. (hist) ‎Hillside Group ‎[383 bytes]
  76. (hist) ‎DMA Design Project - Source Code ‎[383 bytes]
  77. (hist) ‎Divergent change smell ‎[386 bytes]
  78. (hist) ‎Duplicate Observed Data ‎[386 bytes]
  79. (hist) ‎Once and only once ‎[391 bytes]
  80. (hist) ‎JUnit ‎[392 bytes]
  81. (hist) ‎James Ashford Log ‎[397 bytes]
  82. (hist) ‎How to assess ‎[401 bytes]
  83. (hist) ‎Avoid accidental multiple inheritance ‎[404 bytes]
  84. (hist) ‎Self Encapsulate Field ‎[405 bytes]
  85. (hist) ‎Parse tree design ‎[408 bytes]
  86. (hist) ‎Interface ‎[408 bytes]
  87. (hist) ‎Rename Method ‎[419 bytes]
  88. (hist) ‎Square-rectangle problem ‎[424 bytes]
  89. (hist) ‎Subclass ‎[427 bytes]
  90. (hist) ‎Jim Coplien ‎[429 bytes]
  91. (hist) ‎Add Parameter ‎[430 bytes]
  92. (hist) ‎Have courage ‎[431 bytes]
  93. (hist) ‎Cay Horstmann 2006 ‎[432 bytes]
  94. (hist) ‎Agile methods ‎[436 bytes]
  95. (hist) ‎Beware of non-communicating methods ‎[439 bytes]
  96. (hist) ‎Active record pattern ‎[440 bytes]
  97. (hist) ‎Replace Array with Object ‎[451 bytes]
  98. (hist) ‎Association versus Dependency ‎[459 bytes]
  99. (hist) ‎Parameterise Method ‎[460 bytes]
  100. (hist) ‎Abstract class ‎[462 bytes]

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox