Short pages

From CSSEMediaWiki
Jump to: navigation, search

Showing below up to 250 results starting with #51.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Joff's Place ‎[316 bytes]
  2. (hist) ‎Make all Member Variables Private ‎[316 bytes]
  3. (hist) ‎List of OO Languages ‎[317 bytes]
  4. (hist) ‎Vendor lock-in ‎[318 bytes]
  5. (hist) ‎Exam questions ‎[322 bytes]
  6. (hist) ‎Extract Interface ‎[322 bytes]
  7. (hist) ‎Remove Parameter ‎[330 bytes]
  8. (hist) ‎Move methods ‎[334 bytes]
  9. (hist) ‎No Global Variables ‎[336 bytes]
  10. (hist) ‎Pull Up Field ‎[336 bytes]
  11. (hist) ‎Make constructors blocking ‎[338 bytes]
  12. (hist) ‎Replace Parameter with Explicit Methods ‎[342 bytes]
  13. (hist) ‎Erich Gamma ‎[344 bytes]
  14. (hist) ‎Remove Setting Method ‎[345 bytes]
  15. (hist) ‎Collapse Hierarchy ‎[345 bytes]
  16. (hist) ‎Replace Inheritance with Delegation ‎[348 bytes]
  17. (hist) ‎Extract Subclass ‎[351 bytes]
  18. (hist) ‎Keep accessors and mutators separate ‎[359 bytes]
  19. (hist) ‎Robert Cecil Martin 1997b ‎[360 bytes]
  20. (hist) ‎Move Method ‎[361 bytes]
  21. (hist) ‎Replace Constructor with Factory Method ‎[361 bytes]
  22. (hist) ‎Replace Data Value with Object ‎[365 bytes]
  23. (hist) ‎Inline Class ‎[366 bytes]
  24. (hist) ‎Introduce Local Extension ‎[378 bytes]
  25. (hist) ‎Hillside Group ‎[383 bytes]
  26. (hist) ‎DMA Design Project - Source Code ‎[383 bytes]
  27. (hist) ‎Divergent change smell ‎[386 bytes]
  28. (hist) ‎Duplicate Observed Data ‎[386 bytes]
  29. (hist) ‎Once and only once ‎[391 bytes]
  30. (hist) ‎JUnit ‎[392 bytes]
  31. (hist) ‎James Ashford Log ‎[397 bytes]
  32. (hist) ‎How to assess ‎[401 bytes]
  33. (hist) ‎Avoid accidental multiple inheritance ‎[404 bytes]
  34. (hist) ‎Self Encapsulate Field ‎[405 bytes]
  35. (hist) ‎Parse tree design ‎[408 bytes]
  36. (hist) ‎Interface ‎[408 bytes]
  37. (hist) ‎Rename Method ‎[419 bytes]
  38. (hist) ‎Square-rectangle problem ‎[424 bytes]
  39. (hist) ‎Subclass ‎[427 bytes]
  40. (hist) ‎Jim Coplien ‎[429 bytes]
  41. (hist) ‎Add Parameter ‎[430 bytes]
  42. (hist) ‎Have courage ‎[431 bytes]
  43. (hist) ‎Cay Horstmann 2006 ‎[432 bytes]
  44. (hist) ‎Agile methods ‎[436 bytes]
  45. (hist) ‎Beware of non-communicating methods ‎[439 bytes]
  46. (hist) ‎Active record pattern ‎[440 bytes]
  47. (hist) ‎Replace Array with Object ‎[451 bytes]
  48. (hist) ‎Association versus Dependency ‎[459 bytes]
  49. (hist) ‎Parameterise Method ‎[460 bytes]
  50. (hist) ‎Abstract class ‎[462 bytes]
  51. (hist) ‎Option-operand separation ‎[464 bytes]
  52. (hist) ‎Inline Temp ‎[465 bytes]
  53. (hist) ‎Trygve Reenskaug ‎[465 bytes]
  54. (hist) ‎Beware singletons ‎[468 bytes]
  55. (hist) ‎Nelson Shaw Project Log ‎[468 bytes]
  56. (hist) ‎Alternative classes with different interfaces smell ‎[470 bytes]
  57. (hist) ‎Extract Superclass ‎[470 bytes]
  58. (hist) ‎Replace Error Code with Exception ‎[479 bytes]
  59. (hist) ‎Many to many association idiom ‎[482 bytes]
  60. (hist) ‎2010 frog design criticisms ‎[492 bytes]
  61. (hist) ‎Replace Exception with test ‎[493 bytes]
  62. (hist) ‎Introduce common data class ‎[494 bytes]
  63. (hist) ‎Mujtaba's Initial Design ‎[500 bytes]
  64. (hist) ‎Robert Cecil Martin 1996b ‎[501 bytes]
  65. (hist) ‎Single choice principle ‎[505 bytes]
  66. (hist) ‎Replace Type Code with Class ‎[516 bytes]
  67. (hist) ‎Avoid interface pollution ‎[517 bytes]
  68. (hist) ‎Move common factors up the hierarchy ‎[517 bytes]
  69. (hist) ‎Introduce common base class ‎[520 bytes]
  70. (hist) ‎Lazy class smell ‎[530 bytes]
  71. (hist) ‎Primitive obsession smell ‎[532 bytes]
  72. (hist) ‎Replace Magic Number with Symbolic Constant ‎[540 bytes]
  73. (hist) ‎Nomenclature ‎[554 bytes]
  74. (hist) ‎Diamond Problem ‎[555 bytes]
  75. (hist) ‎Accountability Design ‎[558 bytes]
  76. (hist) ‎Change Unidirectional Association to Bidirectional ‎[560 bytes]
  77. (hist) ‎Move Field ‎[561 bytes]
  78. (hist) ‎Kent Beck 2003 ‎[563 bytes]
  79. (hist) ‎Change Value to Reference ‎[564 bytes]
  80. (hist) ‎Unified Modeling Language ‎[565 bytes]
  81. (hist) ‎Robert Pirsig 1974 ‎[568 bytes]
  82. (hist) ‎PLoP 1995 ‎[568 bytes]
  83. (hist) ‎Copy Constructor vs the Encapsulation Boundary ‎[570 bytes]
  84. (hist) ‎Mock objects ‎[579 bytes]
  85. (hist) ‎Extensibility ‎[582 bytes]
  86. (hist) ‎Introduce Parameter Object ‎[582 bytes]
  87. (hist) ‎Data mapper pattern ‎[582 bytes]
  88. (hist) ‎Table data gateway pattern ‎[589 bytes]
  89. (hist) ‎Row data gateway pattern ‎[590 bytes]
  90. (hist) ‎Page controller pattern ‎[594 bytes]
  91. (hist) ‎Comments smell ‎[596 bytes]
  92. (hist) ‎Shotgun surgery smell ‎[601 bytes]
  93. (hist) ‎Introduce Explaining Variable ‎[604 bytes]
  94. (hist) ‎Encapsulate Field ‎[610 bytes]
  95. (hist) ‎Text design ‎[616 bytes]
  96. (hist) ‎Incomplete library class smell ‎[622 bytes]
  97. (hist) ‎Containment implies uses ‎[623 bytes]
  98. (hist) ‎Boat anchor ‎[625 bytes]
  99. (hist) ‎Lecture times ‎[626 bytes]
  100. (hist) ‎Ralph Johnson ‎[627 bytes]
  101. (hist) ‎Split Temporary Variable ‎[628 bytes]
  102. (hist) ‎Agile manifesto ‎[631 bytes]
  103. (hist) ‎Inversion of control ‎[632 bytes]
  104. (hist) ‎Middle man smell ‎[635 bytes]
  105. (hist) ‎Remove assignments to Parameters ‎[644 bytes]
  106. (hist) ‎Introduce Foreign Method ‎[653 bytes]
  107. (hist) ‎Avoid interface bloat ‎[659 bytes]
  108. (hist) ‎Smalltalk ‎[660 bytes]
  109. (hist) ‎Hide Delegate ‎[664 bytes]
  110. (hist) ‎Beware inheritance over composition ‎[667 bytes]
  111. (hist) ‎Law of leaky abstractions ‎[683 bytes]
  112. (hist) ‎Replace Method with Method Object ‎[687 bytes]
  113. (hist) ‎Frogs design ‎[689 bytes]
  114. (hist) ‎Jumble ‎[689 bytes]
  115. (hist) ‎Send messages to components instead of to self ‎[693 bytes]
  116. (hist) ‎Object Encapsulation ‎[693 bytes]
  117. (hist) ‎Perfect OO Language ‎[694 bytes]
  118. (hist) ‎Properties ‎[695 bytes]
  119. (hist) ‎Class diagram ‎[699 bytes]
  120. (hist) ‎Gang of Four 1995 ‎[699 bytes]
  121. (hist) ‎Functional decomposition ‎[705 bytes]
  122. (hist) ‎Split large classes ‎[713 bytes]
  123. (hist) ‎Replace Temp with Query ‎[713 bytes]
  124. (hist) ‎Spaghetti code ‎[715 bytes]
  125. (hist) ‎Abstract classes should be base classes ‎[724 bytes]
  126. (hist) ‎Program to the interface not the implementation ‎[728 bytes]
  127. (hist) ‎Nil or export coupling only ‎[731 bytes]
  128. (hist) ‎Christopher Alexander 1979 ‎[733 bytes]
  129. (hist) ‎Model the room ‎[736 bytes]
  130. (hist) ‎Front controller pattern ‎[738 bytes]
  131. (hist) ‎No Peter Pan objects ‎[741 bytes]
  132. (hist) ‎Gang of Four ‎[745 bytes]
  133. (hist) ‎Main Page ‎[751 bytes]
  134. (hist) ‎Presentation separation idiom ‎[751 bytes]
  135. (hist) ‎Abstraction ‎[754 bytes]
  136. (hist) ‎Design examples ‎[758 bytes]
  137. (hist) ‎Contain contents not parents ‎[766 bytes]
  138. (hist) ‎Ward Cunningham ‎[767 bytes]
  139. (hist) ‎Duplicate code smell ‎[772 bytes]
  140. (hist) ‎Keep related data and behavior in one place ‎[777 bytes]
  141. (hist) ‎Immutable object ‎[780 bytes]
  142. (hist) ‎Temporary field smell ‎[785 bytes]
  143. (hist) ‎Sign your work ‎[788 bytes]
  144. (hist) ‎Speculative generality smell ‎[788 bytes]
  145. (hist) ‎Wiki tips ‎[797 bytes]
  146. (hist) ‎AlexsLibrary ‎[807 bytes]
  147. (hist) ‎Robert Cecil Martin 2003 ‎[818 bytes]
  148. (hist) ‎Extract Class ‎[818 bytes]
  149. (hist) ‎Class Encapsulation ‎[818 bytes]
  150. (hist) ‎PLoP ‎[841 bytes]
  151. (hist) ‎Bob Martin's heuristics ‎[845 bytes]
  152. (hist) ‎Becomes problem ‎[850 bytes]
  153. (hist) ‎One key abstraction ‎[851 bytes]
  154. (hist) ‎Management antipatterns ‎[865 bytes]
  155. (hist) ‎Documenting Patterns ‎[870 bytes]
  156. (hist) ‎Overloading ‎[875 bytes]
  157. (hist) ‎Yo-yo problem ‎[884 bytes]
  158. (hist) ‎Limit compositions in a class ‎[884 bytes]
  159. (hist) ‎Delegation ‎[885 bytes]
  160. (hist) ‎Separate methods that do not communicate ‎[888 bytes]
  161. (hist) ‎Orthogonality ‎[896 bytes]
  162. (hist) ‎Substitute Algorithm ‎[900 bytes]
  163. (hist) ‎Identity map pattern ‎[905 bytes]
  164. (hist) ‎Component versus Module ‎[907 bytes]
  165. (hist) ‎Eliminate case analysis ‎[908 bytes]
  166. (hist) ‎Collecting Parameter ‎[908 bytes]
  167. (hist) ‎Inappropriate intimacy smell ‎[912 bytes]
  168. (hist) ‎Minimize number of methods ‎[918 bytes]
  169. (hist) ‎Reduce the number of arguments ‎[931 bytes]
  170. (hist) ‎Account setup ‎[933 bytes]
  171. (hist) ‎Distribute system intelligence ‎[938 bytes]
  172. (hist) ‎Quotes ‎[944 bytes]
  173. (hist) ‎Rebecca Wirfs-Brock 1990 ‎[950 bytes]
  174. (hist) ‎Preserve Whole Object ‎[954 bytes]
  175. (hist) ‎Avoid inheritance for implementation ‎[956 bytes]
  176. (hist) ‎Agent classes irrelevant ‎[958 bytes]
  177. (hist) ‎Reduce the size of methods ‎[959 bytes]
  178. (hist) ‎Inline Method ‎[969 bytes]
  179. (hist) ‎Switch statement smell ‎[971 bytes]
  180. (hist) ‎Software crisis ‎[972 bytes]
  181. (hist) ‎About COSC427 ‎[973 bytes]
  182. (hist) ‎Refused bequest smell ‎[979 bytes]
  183. (hist) ‎Editing Tips ‎[986 bytes]
  184. (hist) ‎Access levels ‎[1,005 bytes]
  185. (hist) ‎CLU ‎[1,007 bytes]
  186. (hist) ‎Define default values via explicit protocol pattern ‎[1,009 bytes]
  187. (hist) ‎Minimize accesses to variables ‎[1,019 bytes]
  188. (hist) ‎Cut and paste programming ‎[1,022 bytes]
  189. (hist) ‎Wiki etiquette ‎[1,025 bytes]
  190. (hist) ‎OO gurus ‎[1,029 bytes]
  191. (hist) ‎Large class smell ‎[1,032 bytes]
  192. (hist) ‎Unit of work pattern ‎[1,038 bytes]
  193. (hist) ‎Beware of many accessors ‎[1,041 bytes]
  194. (hist) ‎Separation of concerns ‎[1,049 bytes]
  195. (hist) ‎Inheritance ‎[1,052 bytes]
  196. (hist) ‎Interface should be dependent on model ‎[1,057 bytes]
  197. (hist) ‎Inventory and Accounting ‎[1,059 bytes]
  198. (hist) ‎Goto considered harmful ‎[1,061 bytes]
  199. (hist) ‎Alan Kay ‎[1,064 bytes]
  200. (hist) ‎Favor composition over inheritance ‎[1,070 bytes]
  201. (hist) ‎Package versus Namespace ‎[1,074 bytes]
  202. (hist) ‎Tour Guide Project Page ‎[1,090 bytes]
  203. (hist) ‎If it ain't broke don't fix it ‎[1,095 bytes]
  204. (hist) ‎Intelligent children pattern ‎[1,098 bytes]
  205. (hist) ‎Avoid god classes ‎[1,102 bytes]
  206. (hist) ‎Start here ‎[1,104 bytes]
  207. (hist) ‎Data clumps smell ‎[1,107 bytes]
  208. (hist) ‎Avoid verb classes ‎[1,113 bytes]
  209. (hist) ‎Limit hierarchy depth ‎[1,114 bytes]
  210. (hist) ‎AudioSystems ‎[1,118 bytes]
  211. (hist) ‎Extract Method ‎[1,121 bytes]
  212. (hist) ‎Object orgy ‎[1,121 bytes]
  213. (hist) ‎Shallow VS Deep Copy ‎[1,134 bytes]
  214. (hist) ‎Big design up front ‎[1,136 bytes]
  215. (hist) ‎Shalloway and Trott 2002 ‎[1,137 bytes]
  216. (hist) ‎Avoid inheritance for optional containment ‎[1,140 bytes]
  217. (hist) ‎Wal's Fish Tank ‎[1,149 bytes]
  218. (hist) ‎Swiss army knife ‎[1,150 bytes]
  219. (hist) ‎Encapsulate that which varies ‎[1,160 bytes]
  220. (hist) ‎Amelioration patterns ‎[1,161 bytes]
  221. (hist) ‎Behavioral completeness ‎[1,165 bytes]
  222. (hist) ‎Getter and setter policy ‎[1,165 bytes]
  223. (hist) ‎Replace Parameter with Method ‎[1,176 bytes]
  224. (hist) ‎Avoid becomes ‎[1,180 bytes]
  225. (hist) ‎Blackboard System ‎[1,199 bytes]
  226. (hist) ‎GenericGuidelines ‎[1,206 bytes]
  227. (hist) ‎Methods should use most fields of a class ‎[1,207 bytes]
  228. (hist) ‎Schools of thought ‎[1,217 bytes]
  229. (hist) ‎You ain't gonna need it ‎[1,221 bytes]
  230. (hist) ‎Martin Fowler ‎[1,226 bytes]
  231. (hist) ‎Fat interfaces ‎[1,227 bytes]
  232. (hist) ‎Parallel hierarchies problem ‎[1,229 bytes]
  233. (hist) ‎Class versus Object ‎[1,229 bytes]
  234. (hist) ‎Michael's Log ‎[1,229 bytes]
  235. (hist) ‎Method ‎[1,232 bytes]
  236. (hist) ‎The top of the class hierarchy should be abstract ‎[1,241 bytes]
  237. (hist) ‎Stovepipe system ‎[1,246 bytes]
  238. (hist) ‎Reduce implicit parameter passing ‎[1,247 bytes]
  239. (hist) ‎A class should not depend on its users ‎[1,253 bytes]
  240. (hist) ‎Common reuse principle ‎[1,254 bytes]
  241. (hist) ‎Kent Beck ‎[1,273 bytes]
  242. (hist) ‎Ward's wiki ‎[1,274 bytes]
  243. (hist) ‎No silver bullet ‎[1,274 bytes]
  244. (hist) ‎Stable dependencies principle ‎[1,280 bytes]
  245. (hist) ‎Long method smell ‎[1,281 bytes]
  246. (hist) ‎Class hierarchies should be deep and narrow ‎[1,281 bytes]
  247. (hist) ‎Separate non-communicating behaviour ‎[1,283 bytes]
  248. (hist) ‎Don't repeat yourself ‎[1,285 bytes]
  249. (hist) ‎Message chain smell ‎[1,287 bytes]
  250. (hist) ‎Bob Martin's principles ‎[1,289 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox