Short pages
From CSSEMediaWiki
Showing below up to 500 results starting with #1.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) John Hofman US001 [0 bytes]
- (hist) John Hofman's Log [0 bytes]
- (hist) Jenny Harlow [0 bytes]
- (hist) Put semantic constraints in class definition [12 bytes]
- (hist) Put semantic constraints in constructors [13 bytes]
- (hist) Different Design [33 bytes]
- (hist) Beware accessors [37 bytes]
- (hist) Kris's Design Study [69 bytes]
- (hist) Bertrand Meyer [70 bytes]
- (hist) Arthur Riel [99 bytes]
- (hist) Lecture sequence [111 bytes]
- (hist) Instance [113 bytes]
- (hist) State machine design [141 bytes]
- (hist) Joshua Bloch [148 bytes]
- (hist) Real name [159 bytes]
- (hist) Vehicles and operators design [166 bytes]
- (hist) Designfest [169 bytes]
- (hist) Remove Middle Man [171 bytes]
- (hist) Superclass [177 bytes]
- (hist) Parallel inheritance hierarchies smell [182 bytes]
- (hist) Robert Cecil Martin 1996c [190 bytes]
- (hist) Robert Cecil Martin 1996d [191 bytes]
- (hist) Push Down Field [191 bytes]
- (hist) Encapsulate Downcast [193 bytes]
- (hist) Ward and Kent [195 bytes]
- (hist) Managing complexity [201 bytes]
- (hist) Inheritance for specialization [206 bytes]
- (hist) Push Down Method [216 bytes]
- (hist) Change Reference to Value [226 bytes]
- (hist) Idioms [232 bytes]
- (hist) Separate Query from Modifier [232 bytes]
- (hist) Pull Up Constructor Body [235 bytes]
- (hist) Robert Cecil Martin 1997a [246 bytes]
- (hist) Favour deep hierarchies [248 bytes]
- (hist) Toast [248 bytes]
- (hist) Serialization [257 bytes]
- (hist) Hide your decisions [273 bytes]
- (hist) Robert Cecil Martin 1996e [274 bytes]
- (hist) Establishing priorities [274 bytes]
- (hist) Citation needed [277 bytes]
- (hist) Extract Hierarchy [282 bytes]
- (hist) Reusable frameworks over reusable components [284 bytes]
- (hist) Referring to Objects [285 bytes]
- (hist) Do not change the state of an object without going through its public interface [287 bytes]
- (hist) Pull Up Method [287 bytes]
- (hist) Hide Method [287 bytes]
- (hist) Replace Conditional with Polymorphism [288 bytes]
- (hist) Robert Cecil Martin 1996a [299 bytes]
- (hist) GenA: A Genetic Algorithms Framework [307 bytes]
- (hist) Robert Cecil Martin 2002 [314 bytes]
- (hist) Joff's Place [316 bytes]
- (hist) Make all Member Variables Private [316 bytes]
- (hist) List of OO Languages [317 bytes]
- (hist) Vendor lock-in [318 bytes]
- (hist) Exam questions [322 bytes]
- (hist) Extract Interface [322 bytes]
- (hist) Remove Parameter [330 bytes]
- (hist) Move methods [334 bytes]
- (hist) No Global Variables [336 bytes]
- (hist) Pull Up Field [336 bytes]
- (hist) Make constructors blocking [338 bytes]
- (hist) Replace Parameter with Explicit Methods [342 bytes]
- (hist) Erich Gamma [344 bytes]
- (hist) Remove Setting Method [345 bytes]
- (hist) Collapse Hierarchy [345 bytes]
- (hist) Replace Inheritance with Delegation [348 bytes]
- (hist) Extract Subclass [351 bytes]
- (hist) Keep accessors and mutators separate [359 bytes]
- (hist) Robert Cecil Martin 1997b [360 bytes]
- (hist) Move Method [361 bytes]
- (hist) Replace Constructor with Factory Method [361 bytes]
- (hist) Replace Data Value with Object [365 bytes]
- (hist) Inline Class [366 bytes]
- (hist) Introduce Local Extension [378 bytes]
- (hist) Hillside Group [383 bytes]
- (hist) DMA Design Project - Source Code [383 bytes]
- (hist) Divergent change smell [386 bytes]
- (hist) Duplicate Observed Data [386 bytes]
- (hist) Once and only once [391 bytes]
- (hist) JUnit [392 bytes]
- (hist) James Ashford Log [397 bytes]
- (hist) How to assess [401 bytes]
- (hist) Avoid accidental multiple inheritance [404 bytes]
- (hist) Self Encapsulate Field [405 bytes]
- (hist) Parse tree design [408 bytes]
- (hist) Interface [408 bytes]
- (hist) Rename Method [419 bytes]
- (hist) Square-rectangle problem [424 bytes]
- (hist) Subclass [427 bytes]
- (hist) Jim Coplien [429 bytes]
- (hist) Add Parameter [430 bytes]
- (hist) Have courage [431 bytes]
- (hist) Cay Horstmann 2006 [432 bytes]
- (hist) Agile methods [436 bytes]
- (hist) Beware of non-communicating methods [439 bytes]
- (hist) Active record pattern [440 bytes]
- (hist) Replace Array with Object [451 bytes]
- (hist) Association versus Dependency [459 bytes]
- (hist) Parameterise Method [460 bytes]
- (hist) Abstract class [462 bytes]
- (hist) Option-operand separation [464 bytes]
- (hist) Inline Temp [465 bytes]
- (hist) Trygve Reenskaug [465 bytes]
- (hist) Beware singletons [468 bytes]
- (hist) Nelson Shaw Project Log [468 bytes]
- (hist) Alternative classes with different interfaces smell [470 bytes]
- (hist) Extract Superclass [470 bytes]
- (hist) Replace Error Code with Exception [479 bytes]
- (hist) Many to many association idiom [482 bytes]
- (hist) 2010 frog design criticisms [492 bytes]
- (hist) Replace Exception with test [493 bytes]
- (hist) Introduce common data class [494 bytes]
- (hist) Mujtaba's Initial Design [500 bytes]
- (hist) Robert Cecil Martin 1996b [501 bytes]
- (hist) Single choice principle [505 bytes]
- (hist) Replace Type Code with Class [516 bytes]
- (hist) Avoid interface pollution [517 bytes]
- (hist) Move common factors up the hierarchy [517 bytes]
- (hist) Introduce common base class [520 bytes]
- (hist) Lazy class smell [530 bytes]
- (hist) Primitive obsession smell [532 bytes]
- (hist) Replace Magic Number with Symbolic Constant [540 bytes]
- (hist) Nomenclature [554 bytes]
- (hist) Diamond Problem [555 bytes]
- (hist) Accountability Design [558 bytes]
- (hist) Change Unidirectional Association to Bidirectional [560 bytes]
- (hist) Move Field [561 bytes]
- (hist) Kent Beck 2003 [563 bytes]
- (hist) Change Value to Reference [564 bytes]
- (hist) Unified Modeling Language [565 bytes]
- (hist) Robert Pirsig 1974 [568 bytes]
- (hist) PLoP 1995 [568 bytes]
- (hist) Copy Constructor vs the Encapsulation Boundary [570 bytes]
- (hist) Mock objects [579 bytes]
- (hist) Extensibility [582 bytes]
- (hist) Introduce Parameter Object [582 bytes]
- (hist) Data mapper pattern [582 bytes]
- (hist) Table data gateway pattern [589 bytes]
- (hist) Row data gateway pattern [590 bytes]
- (hist) Page controller pattern [594 bytes]
- (hist) Comments smell [596 bytes]
- (hist) Shotgun surgery smell [601 bytes]
- (hist) Introduce Explaining Variable [604 bytes]
- (hist) Encapsulate Field [610 bytes]
- (hist) Text design [616 bytes]
- (hist) Incomplete library class smell [622 bytes]
- (hist) Containment implies uses [623 bytes]
- (hist) Boat anchor [625 bytes]
- (hist) Lecture times [626 bytes]
- (hist) Ralph Johnson [627 bytes]
- (hist) Split Temporary Variable [628 bytes]
- (hist) Agile manifesto [631 bytes]
- (hist) Inversion of control [632 bytes]
- (hist) Middle man smell [635 bytes]
- (hist) Remove assignments to Parameters [644 bytes]
- (hist) Introduce Foreign Method [653 bytes]
- (hist) Avoid interface bloat [659 bytes]
- (hist) Smalltalk [660 bytes]
- (hist) Hide Delegate [664 bytes]
- (hist) Beware inheritance over composition [667 bytes]
- (hist) Law of leaky abstractions [683 bytes]
- (hist) Replace Method with Method Object [687 bytes]
- (hist) Frogs design [689 bytes]
- (hist) Jumble [689 bytes]
- (hist) Send messages to components instead of to self [693 bytes]
- (hist) Object Encapsulation [693 bytes]
- (hist) Perfect OO Language [694 bytes]
- (hist) Properties [695 bytes]
- (hist) Class diagram [699 bytes]
- (hist) Gang of Four 1995 [699 bytes]
- (hist) Functional decomposition [705 bytes]
- (hist) Split large classes [713 bytes]
- (hist) Replace Temp with Query [713 bytes]
- (hist) Spaghetti code [715 bytes]
- (hist) Abstract classes should be base classes [724 bytes]
- (hist) Program to the interface not the implementation [728 bytes]
- (hist) Nil or export coupling only [731 bytes]
- (hist) Christopher Alexander 1979 [733 bytes]
- (hist) Model the room [736 bytes]
- (hist) Front controller pattern [738 bytes]
- (hist) No Peter Pan objects [741 bytes]
- (hist) Gang of Four [745 bytes]
- (hist) Main Page [751 bytes]
- (hist) Presentation separation idiom [751 bytes]
- (hist) Abstraction [754 bytes]
- (hist) Design examples [758 bytes]
- (hist) Contain contents not parents [766 bytes]
- (hist) Ward Cunningham [767 bytes]
- (hist) Duplicate code smell [772 bytes]
- (hist) Keep related data and behavior in one place [777 bytes]
- (hist) Immutable object [780 bytes]
- (hist) Temporary field smell [785 bytes]
- (hist) Sign your work [788 bytes]
- (hist) Speculative generality smell [788 bytes]
- (hist) Wiki tips [797 bytes]
- (hist) AlexsLibrary [807 bytes]
- (hist) Robert Cecil Martin 2003 [818 bytes]
- (hist) Extract Class [818 bytes]
- (hist) Class Encapsulation [818 bytes]
- (hist) PLoP [841 bytes]
- (hist) Bob Martin's heuristics [845 bytes]
- (hist) Becomes problem [850 bytes]
- (hist) One key abstraction [851 bytes]
- (hist) Management antipatterns [865 bytes]
- (hist) Documenting Patterns [870 bytes]
- (hist) Overloading [875 bytes]
- (hist) Yo-yo problem [884 bytes]
- (hist) Limit compositions in a class [884 bytes]
- (hist) Delegation [885 bytes]
- (hist) Separate methods that do not communicate [888 bytes]
- (hist) Orthogonality [896 bytes]
- (hist) Substitute Algorithm [900 bytes]
- (hist) Identity map pattern [905 bytes]
- (hist) Component versus Module [907 bytes]
- (hist) Eliminate case analysis [908 bytes]
- (hist) Collecting Parameter [908 bytes]
- (hist) Inappropriate intimacy smell [912 bytes]
- (hist) Minimize number of methods [918 bytes]
- (hist) Reduce the number of arguments [931 bytes]
- (hist) Account setup [933 bytes]
- (hist) Distribute system intelligence [938 bytes]
- (hist) Quotes [944 bytes]
- (hist) Rebecca Wirfs-Brock 1990 [950 bytes]
- (hist) Preserve Whole Object [954 bytes]
- (hist) Avoid inheritance for implementation [956 bytes]
- (hist) Agent classes irrelevant [958 bytes]
- (hist) Reduce the size of methods [959 bytes]
- (hist) Inline Method [969 bytes]
- (hist) Switch statement smell [971 bytes]
- (hist) Software crisis [972 bytes]
- (hist) About COSC427 [973 bytes]
- (hist) Refused bequest smell [979 bytes]
- (hist) Editing Tips [986 bytes]
- (hist) Access levels [1,005 bytes]
- (hist) CLU [1,007 bytes]
- (hist) Define default values via explicit protocol pattern [1,009 bytes]
- (hist) Minimize accesses to variables [1,019 bytes]
- (hist) Cut and paste programming [1,022 bytes]
- (hist) Wiki etiquette [1,025 bytes]
- (hist) OO gurus [1,029 bytes]
- (hist) Large class smell [1,032 bytes]
- (hist) Unit of work pattern [1,038 bytes]
- (hist) Beware of many accessors [1,041 bytes]
- (hist) Separation of concerns [1,049 bytes]
- (hist) Inheritance [1,052 bytes]
- (hist) Interface should be dependent on model [1,057 bytes]
- (hist) Inventory and Accounting [1,059 bytes]
- (hist) Goto considered harmful [1,061 bytes]
- (hist) Alan Kay [1,064 bytes]
- (hist) Favor composition over inheritance [1,070 bytes]
- (hist) Package versus Namespace [1,074 bytes]
- (hist) Tour Guide Project Page [1,090 bytes]
- (hist) If it ain't broke don't fix it [1,095 bytes]
- (hist) Intelligent children pattern [1,098 bytes]
- (hist) Avoid god classes [1,102 bytes]
- (hist) Start here [1,104 bytes]
- (hist) Data clumps smell [1,107 bytes]
- (hist) Avoid verb classes [1,113 bytes]
- (hist) Limit hierarchy depth [1,114 bytes]
- (hist) AudioSystems [1,118 bytes]
- (hist) Extract Method [1,121 bytes]
- (hist) Object orgy [1,121 bytes]
- (hist) Shallow VS Deep Copy [1,134 bytes]
- (hist) Big design up front [1,136 bytes]
- (hist) Shalloway and Trott 2002 [1,137 bytes]
- (hist) Avoid inheritance for optional containment [1,140 bytes]
- (hist) Wal's Fish Tank [1,149 bytes]
- (hist) Swiss army knife [1,150 bytes]
- (hist) Encapsulate that which varies [1,160 bytes]
- (hist) Amelioration patterns [1,161 bytes]
- (hist) Behavioral completeness [1,165 bytes]
- (hist) Getter and setter policy [1,165 bytes]
- (hist) Replace Parameter with Method [1,176 bytes]
- (hist) Avoid becomes [1,180 bytes]
- (hist) Blackboard System [1,199 bytes]
- (hist) GenericGuidelines [1,206 bytes]
- (hist) Methods should use most fields of a class [1,207 bytes]
- (hist) Schools of thought [1,217 bytes]
- (hist) You ain't gonna need it [1,221 bytes]
- (hist) Martin Fowler [1,226 bytes]
- (hist) Fat interfaces [1,227 bytes]
- (hist) Parallel hierarchies problem [1,229 bytes]
- (hist) Class versus Object [1,229 bytes]
- (hist) Michael's Log [1,229 bytes]
- (hist) Method [1,232 bytes]
- (hist) The top of the class hierarchy should be abstract [1,241 bytes]
- (hist) Stovepipe system [1,246 bytes]
- (hist) Reduce implicit parameter passing [1,247 bytes]
- (hist) A class should not depend on its users [1,253 bytes]
- (hist) Common reuse principle [1,254 bytes]
- (hist) Kent Beck [1,273 bytes]
- (hist) Ward's wiki [1,274 bytes]
- (hist) No silver bullet [1,274 bytes]
- (hist) Stable dependencies principle [1,280 bytes]
- (hist) Long method smell [1,281 bytes]
- (hist) Class hierarchies should be deep and narrow [1,281 bytes]
- (hist) Separate non-communicating behaviour [1,283 bytes]
- (hist) Don't repeat yourself [1,285 bytes]
- (hist) Message chain smell [1,287 bytes]
- (hist) Bob Martin's principles [1,289 bytes]
- (hist) Avoid no-op overrides [1,295 bytes]
- (hist) Arthur Riel 1996 [1,301 bytes]
- (hist) Presentation Abstraction Control [1,309 bytes]
- (hist) Wals library [1,315 bytes]
- (hist) Data class smell [1,333 bytes]
- (hist) Domain model pattern [1,337 bytes]
- (hist) Common closure principle [1,345 bytes]
- (hist) Poltergeists [1,348 bytes]
- (hist) Exam Quick Reference [1,354 bytes]
- (hist) Service layer pattern [1,369 bytes]
- (hist) Transaction script pattern [1,371 bytes]
- (hist) Polymorphism [1,372 bytes]
- (hist) PLoP (Software Patterns Series) [1,374 bytes]
- (hist) Long parameter list smell [1,380 bytes]
- (hist) Hall of fame [1,381 bytes]
- (hist) Andrew Hunt 1999 [1,425 bytes]
- (hist) Avoid multiple inheritance [1,428 bytes]
- (hist) 2009 frog design criticisms [1,428 bytes]
- (hist) Minimal public interface [1,431 bytes]
- (hist) Reinvent the wheel [1,439 bytes]
- (hist) Model the real world [1,442 bytes]
- (hist) Beware value switches [1,445 bytes]
- (hist) Introduce Null Object [1,450 bytes]
- (hist) Table module pattern [1,454 bytes]
- (hist) Johnson and Foote's heuristics [1,468 bytes]
- (hist) Recursion introduction [1,471 bytes]
- (hist) Subclasses should be specializations [1,491 bytes]
- (hist) Constant interface [1,496 bytes]
- (hist) Jason's Useful Links Page [1,497 bytes]
- (hist) Extreme programming [1,499 bytes]
- (hist) God object [1,506 bytes]
- (hist) Contained objects should not use each other [1,516 bytes]
- (hist) Identify message layers pattern [1,518 bytes]
- (hist) Hierarchical Model View Controller [1,528 bytes]
- (hist) Bob Martin [1,539 bytes]
- (hist) Martin Fowler 1999 [1,540 bytes]
- (hist) Lazy load pattern [1,541 bytes]
- (hist) Factor implementation differences into subcomponents [1,563 bytes]
- (hist) Avoid side effects [1,584 bytes]
- (hist) OO culture [1,608 bytes]
- (hist) Christopher Alexander [1,618 bytes]
- (hist) OO wisdom [1,625 bytes]
- (hist) Wiki users [1,635 bytes]
- (hist) Avoid protected data [1,654 bytes]
- (hist) Tanmay's Log [1,670 bytes]
- (hist) Party of Five 1996 [1,671 bytes]
- (hist) Abstract vs Interface [1,675 bytes]
- (hist) One Into Many [1,691 bytes]
- (hist) Double Dispatch [1,723 bytes]
- (hist) Feature envy smell [1,732 bytes]
- (hist) Reuse release equivalence principle [1,741 bytes]
- (hist) Named constants [1,743 bytes]
- (hist) Encapsulation is hierarchical [1,757 bytes]
- (hist) Do the simplest thing that could possibly work [1,761 bytes]
- (hist) Transform view pattern [1,771 bytes]
- (hist) Circular dependency [1,774 bytes]
- (hist) Monsters design [1,825 bytes]
- (hist) Keep last years stuff [1,830 bytes]
- (hist) Alumni [1,860 bytes]
- (hist) Architectural patterns [1,861 bytes]
- (hist) Don't burn your base class [1,865 bytes]
- (hist) Super quick exam ref [1,867 bytes]
- (hist) Implement behavior with abstract state pattern [1,885 bytes]
- (hist) Strategy meets Template [1,886 bytes]
- (hist) Unit Test [1,898 bytes]
- (hist) Barbara Liskov [1,915 bytes]
- (hist) Sorcerers design [1,924 bytes]
- (hist) Properties / Fields / Attributes [1,943 bytes]
- (hist) Avoid downcasting [1,948 bytes]
- (hist) Model classes not roles [1,976 bytes]
- (hist) Object pool [1,987 bytes]
- (hist) Anemic Domain Model [1,989 bytes]
- (hist) Object cesspool [2,003 bytes]
- (hist) Information hiding [2,008 bytes]
- (hist) Video rental system [2,010 bytes]
- (hist) Chain of Responsibility [2,016 bytes]
- (hist) Encapsulation [2,025 bytes]
- (hist) Multiple Inheritance [2,051 bytes]
- (hist) Call super [2,053 bytes]
- (hist) Empty method over-rides [2,056 bytes]
- (hist) Rebecca Wirfs-Brock [2,081 bytes]
- (hist) Sequential coupling [2,110 bytes]
- (hist) Trains design [2,147 bytes]
- (hist) Aggregation versus Composition [2,176 bytes]
- (hist) Template view pattern [2,178 bytes]
- (hist) Why refactoring works [2,188 bytes]
- (hist) Define classes by behavior, not state pattern [2,259 bytes]
- (hist) Maxim Hierarchy [2,297 bytes]
- (hist) Impedance mismatch [2,304 bytes]
- (hist) Circle-ellipse problem [2,313 bytes]
- (hist) Introduction to the Terrain Renderer [2,337 bytes]
- (hist) Design maxims Equivalence [2,376 bytes]
- (hist) BaseBean [2,415 bytes]
- (hist) What is Bad Design [2,428 bytes]
- (hist) Acyclic dependencies principle [2,437 bytes]
- (hist) Hide data within its class [2,445 bytes]
- (hist) Encapsulate concrete state pattern [2,461 bytes]
- (hist) Dependency injection [2,504 bytes]
- (hist) Patterns [2,508 bytes]
- (hist) Open closed principle [2,522 bytes]
- (hist) Johnson and Foote 1988 [2,522 bytes]
- (hist) Christopher Alexander 1977 [2,524 bytes]
- (hist) Peer To Peer [2,524 bytes]
- (hist) Premature optimization [2,525 bytes]
- (hist) Enum idiom [2,528 bytes]
- (hist) Tell, don't ask [2,546 bytes]
- (hist) Big ball of mud [2,574 bytes]
- (hist) Defer identification of state variables pattern [2,591 bytes]
- (hist) A froggy visitor [2,592 bytes]
- (hist) Single responsibility principle [2,663 bytes]
- (hist) Dependency inversion principle [2,691 bytes]
- (hist) Combining design patterns [2,693 bytes]
- (hist) Avoid equals [2,698 bytes]
- (hist) Ken Auer [2,711 bytes]
- (hist) Eliminate irrelevant classes [2,719 bytes]
- (hist) Beware type switches [2,728 bytes]
- (hist) Scrum [2,758 bytes]
- (hist) Interpreter [2,774 bytes]
- (hist) Test Driven Development [2,825 bytes]
- (hist) Code smells [2,842 bytes]
- (hist) Interface segregation principle [2,856 bytes]
- (hist) Organisational patterns [2,862 bytes]
- (hist) Design patterns break rules [2,867 bytes]
- (hist) Avoid mixing inputs and outputs [2,891 bytes]
- (hist) Builder [2,955 bytes]
- (hist) Favour containment over association [3,026 bytes]
- (hist) Facade [3,029 bytes]
- (hist) Stable abstractions principle [3,084 bytes]
- (hist) State [3,126 bytes]
- (hist) Greg Searle's project blackjack [3,145 bytes]
- (hist) OO tools [3,243 bytes]
- (hist) Don't expose mutable attributes [3,259 bytes]
- (hist) Ken Auer 1995 [3,282 bytes]
- (hist) Jojo's OO Design Project Log [3,317 bytes]
- (hist) Comments and suggestions [3,321 bytes]
- (hist) Proxy [3,342 bytes]
- (hist) Teaching and learning style [3,347 bytes]
- (hist) Template Method [3,411 bytes]
- (hist) William Brown 1998 [3,426 bytes]
- (hist) Bridge [3,429 bytes]
- (hist) Java Collections Framework [3,480 bytes]
- (hist) Decomposition [3,657 bytes]
- (hist) Avoid concrete base classes [3,658 bytes]
- (hist) Equals vs the Encapsulation Boundary [3,664 bytes]
- (hist) Singleton [3,672 bytes]
- (hist) Object-oriented design anti-patterns [3,725 bytes]
- (hist) Advice from alumni [3,782 bytes]
- (hist) Memento [3,795 bytes]
- (hist) BenjaminTaylor Previous Design Work [3,798 bytes]
- (hist) Iterator [3,823 bytes]
- (hist) Use lazy initialization pattern [3,932 bytes]
- (hist) David Parnas [3,981 bytes]
- (hist) PluS XML format [4,008 bytes]
- (hist) Frogs second design [4,043 bytes]
- (hist) Decorator [4,065 bytes]
- (hist) 427 assessment [4,119 bytes]
- (hist) Automation [4,185 bytes]
- (hist) Getters and setters [4,193 bytes]
- (hist) Factory Method [4,294 bytes]
- (hist) Law of Demeter [4,356 bytes]
- (hist) Command [4,367 bytes]
- (hist) Refactoring and design [4,368 bytes]
- (hist) Adapter [4,377 bytes]
- (hist) Design maxims [4,442 bytes]
- (hist) Mediator [4,445 bytes]
- (hist) Flyweight [4,505 bytes]
- (hist) Similar patterns and how to tell them apart [4,620 bytes]
- (hist) Are you gonna eat that [4,643 bytes]
- (hist) Design by contract [4,723 bytes]
- (hist) Project ideas [4,749 bytes]
- (hist) Command query separation [4,800 bytes]
- (hist) Accountability [4,842 bytes]
- (hist) Mujtaba's Log [4,859 bytes]
- (hist) Antipatterns [4,871 bytes]
- (hist) Analysis patterns [4,875 bytes]
- (hist) HistoryCrumbs.user.js [4,880 bytes]
- (hist) 2007 Exam answers [4,882 bytes]
- (hist) Visitor [4,916 bytes]
- (hist) Liskov substitution principle [4,997 bytes]
- (hist) Observations and Measurements [5,113 bytes]
- (hist) Abstract Factory [5,148 bytes]
- (hist) Strategy [5,359 bytes]
- (hist) Composite [5,437 bytes]
- (hist) Model view controller [5,740 bytes]
- (hist) Refactoring [5,822 bytes]
- (hist) Professionalism [5,845 bytes]
- (hist) RL Design Study Log [6,055 bytes]
- (hist) Prototype [6,221 bytes]
- (hist) 2006 Exam answers [6,595 bytes]
- (hist) Observer [6,640 bytes]
- (hist) 427 design standard [6,699 bytes]
- (hist) Joshua Bloch 2006 Bumper Sticker API Design [7,020 bytes]
- (hist) Party of five 1996 [7,034 bytes]
- (hist) Coupling and cohesion [7,140 bytes]
- (hist) Encapsulate Collection [7,224 bytes]
- (hist) DMA Design Project first draft [7,369 bytes]
- (hist) Refactoring and performance [7,512 bytes]
- (hist) Martin Fowler 2003 [7,526 bytes]
- (hist) Software reuse [7,696 bytes]
- (hist) DMA Design Project - first submission [7,745 bytes]