Long pages
From CSSEMediaWiki
Showing below up to 250 results starting with #251.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) Presentation Abstraction Control [1,309 bytes]
- (hist) Arthur Riel 1996 [1,301 bytes]
- (hist) Avoid no-op overrides [1,295 bytes]
- (hist) Bob Martin's principles [1,289 bytes]
- (hist) Message chain smell [1,287 bytes]
- (hist) Don't repeat yourself [1,285 bytes]
- (hist) Separate non-communicating behaviour [1,283 bytes]
- (hist) Class hierarchies should be deep and narrow [1,281 bytes]
- (hist) Long method smell [1,281 bytes]
- (hist) Stable dependencies principle [1,280 bytes]
- (hist) No silver bullet [1,274 bytes]
- (hist) Ward's wiki [1,274 bytes]
- (hist) Kent Beck [1,273 bytes]
- (hist) Common reuse principle [1,254 bytes]
- (hist) A class should not depend on its users [1,253 bytes]
- (hist) Reduce implicit parameter passing [1,247 bytes]
- (hist) Stovepipe system [1,246 bytes]
- (hist) The top of the class hierarchy should be abstract [1,241 bytes]
- (hist) Method [1,232 bytes]
- (hist) Michael's Log [1,229 bytes]
- (hist) Class versus Object [1,229 bytes]
- (hist) Parallel hierarchies problem [1,229 bytes]
- (hist) Fat interfaces [1,227 bytes]
- (hist) Martin Fowler [1,226 bytes]
- (hist) You ain't gonna need it [1,221 bytes]
- (hist) Schools of thought [1,217 bytes]
- (hist) Methods should use most fields of a class [1,207 bytes]
- (hist) GenericGuidelines [1,206 bytes]
- (hist) Blackboard System [1,199 bytes]
- (hist) Avoid becomes [1,180 bytes]
- (hist) Replace Parameter with Method [1,176 bytes]
- (hist) Getter and setter policy [1,165 bytes]
- (hist) Behavioral completeness [1,165 bytes]
- (hist) Amelioration patterns [1,161 bytes]
- (hist) Encapsulate that which varies [1,160 bytes]
- (hist) Swiss army knife [1,150 bytes]
- (hist) Wal's Fish Tank [1,149 bytes]
- (hist) Avoid inheritance for optional containment [1,140 bytes]
- (hist) Shalloway and Trott 2002 [1,137 bytes]
- (hist) Big design up front [1,136 bytes]
- (hist) Shallow VS Deep Copy [1,134 bytes]
- (hist) Object orgy [1,121 bytes]
- (hist) Extract Method [1,121 bytes]
- (hist) AudioSystems [1,118 bytes]
- (hist) Limit hierarchy depth [1,114 bytes]
- (hist) Avoid verb classes [1,113 bytes]
- (hist) Data clumps smell [1,107 bytes]
- (hist) Start here [1,104 bytes]
- (hist) Avoid god classes [1,102 bytes]
- (hist) Intelligent children pattern [1,098 bytes]
- (hist) If it ain't broke don't fix it [1,095 bytes]
- (hist) Tour Guide Project Page [1,090 bytes]
- (hist) Package versus Namespace [1,074 bytes]
- (hist) Favor composition over inheritance [1,070 bytes]
- (hist) Alan Kay [1,064 bytes]
- (hist) Goto considered harmful [1,061 bytes]
- (hist) Inventory and Accounting [1,059 bytes]
- (hist) Interface should be dependent on model [1,057 bytes]
- (hist) Inheritance [1,052 bytes]
- (hist) Separation of concerns [1,049 bytes]
- (hist) Beware of many accessors [1,041 bytes]
- (hist) Unit of work pattern [1,038 bytes]
- (hist) Large class smell [1,032 bytes]
- (hist) OO gurus [1,029 bytes]
- (hist) Wiki etiquette [1,025 bytes]
- (hist) Cut and paste programming [1,022 bytes]
- (hist) Minimize accesses to variables [1,019 bytes]
- (hist) Define default values via explicit protocol pattern [1,009 bytes]
- (hist) CLU [1,007 bytes]
- (hist) Access levels [1,005 bytes]
- (hist) Editing Tips [986 bytes]
- (hist) Refused bequest smell [979 bytes]
- (hist) About COSC427 [973 bytes]
- (hist) Software crisis [972 bytes]
- (hist) Switch statement smell [971 bytes]
- (hist) Inline Method [969 bytes]
- (hist) Reduce the size of methods [959 bytes]
- (hist) Agent classes irrelevant [958 bytes]
- (hist) Avoid inheritance for implementation [956 bytes]
- (hist) Preserve Whole Object [954 bytes]
- (hist) Rebecca Wirfs-Brock 1990 [950 bytes]
- (hist) Quotes [944 bytes]
- (hist) Distribute system intelligence [938 bytes]
- (hist) Account setup [933 bytes]
- (hist) Reduce the number of arguments [931 bytes]
- (hist) Minimize number of methods [918 bytes]
- (hist) Inappropriate intimacy smell [912 bytes]
- (hist) Collecting Parameter [908 bytes]
- (hist) Eliminate case analysis [908 bytes]
- (hist) Component versus Module [907 bytes]
- (hist) Identity map pattern [905 bytes]
- (hist) Substitute Algorithm [900 bytes]
- (hist) Orthogonality [896 bytes]
- (hist) Separate methods that do not communicate [888 bytes]
- (hist) Delegation [885 bytes]
- (hist) Limit compositions in a class [884 bytes]
- (hist) Yo-yo problem [884 bytes]
- (hist) Overloading [875 bytes]
- (hist) Documenting Patterns [870 bytes]
- (hist) Management antipatterns [865 bytes]
- (hist) One key abstraction [851 bytes]
- (hist) Becomes problem [850 bytes]
- (hist) Bob Martin's heuristics [845 bytes]
- (hist) PLoP [841 bytes]
- (hist) Class Encapsulation [818 bytes]
- (hist) Extract Class [818 bytes]
- (hist) Robert Cecil Martin 2003 [818 bytes]
- (hist) AlexsLibrary [807 bytes]
- (hist) Wiki tips [797 bytes]
- (hist) Speculative generality smell [788 bytes]
- (hist) Sign your work [788 bytes]
- (hist) Temporary field smell [785 bytes]
- (hist) Immutable object [780 bytes]
- (hist) Keep related data and behavior in one place [777 bytes]
- (hist) Duplicate code smell [772 bytes]
- (hist) Ward Cunningham [767 bytes]
- (hist) Contain contents not parents [766 bytes]
- (hist) Design examples [758 bytes]
- (hist) Abstraction [754 bytes]
- (hist) Presentation separation idiom [751 bytes]
- (hist) Main Page [751 bytes]
- (hist) Gang of Four [745 bytes]
- (hist) No Peter Pan objects [741 bytes]
- (hist) Front controller pattern [738 bytes]
- (hist) Model the room [736 bytes]
- (hist) Christopher Alexander 1979 [733 bytes]
- (hist) Nil or export coupling only [731 bytes]
- (hist) Program to the interface not the implementation [728 bytes]
- (hist) Abstract classes should be base classes [724 bytes]
- (hist) Spaghetti code [715 bytes]
- (hist) Replace Temp with Query [713 bytes]
- (hist) Split large classes [713 bytes]
- (hist) Functional decomposition [705 bytes]
- (hist) Gang of Four 1995 [699 bytes]
- (hist) Class diagram [699 bytes]
- (hist) Properties [695 bytes]
- (hist) Perfect OO Language [694 bytes]
- (hist) Object Encapsulation [693 bytes]
- (hist) Send messages to components instead of to self [693 bytes]
- (hist) Jumble [689 bytes]
- (hist) Frogs design [689 bytes]
- (hist) Replace Method with Method Object [687 bytes]
- (hist) Law of leaky abstractions [683 bytes]
- (hist) Beware inheritance over composition [667 bytes]
- (hist) Hide Delegate [664 bytes]
- (hist) Smalltalk [660 bytes]
- (hist) Avoid interface bloat [659 bytes]
- (hist) Introduce Foreign Method [653 bytes]
- (hist) Remove assignments to Parameters [644 bytes]
- (hist) Middle man smell [635 bytes]
- (hist) Inversion of control [632 bytes]
- (hist) Agile manifesto [631 bytes]
- (hist) Split Temporary Variable [628 bytes]
- (hist) Ralph Johnson [627 bytes]
- (hist) Lecture times [626 bytes]
- (hist) Boat anchor [625 bytes]
- (hist) Containment implies uses [623 bytes]
- (hist) Incomplete library class smell [622 bytes]
- (hist) Text design [616 bytes]
- (hist) Encapsulate Field [610 bytes]
- (hist) Introduce Explaining Variable [604 bytes]
- (hist) Shotgun surgery smell [601 bytes]
- (hist) Comments smell [596 bytes]
- (hist) Page controller pattern [594 bytes]
- (hist) Row data gateway pattern [590 bytes]
- (hist) Table data gateway pattern [589 bytes]
- (hist) Data mapper pattern [582 bytes]
- (hist) Introduce Parameter Object [582 bytes]
- (hist) Extensibility [582 bytes]
- (hist) Mock objects [579 bytes]
- (hist) Copy Constructor vs the Encapsulation Boundary [570 bytes]
- (hist) PLoP 1995 [568 bytes]
- (hist) Robert Pirsig 1974 [568 bytes]
- (hist) Unified Modeling Language [565 bytes]
- (hist) Change Value to Reference [564 bytes]
- (hist) Kent Beck 2003 [563 bytes]
- (hist) Move Field [561 bytes]
- (hist) Change Unidirectional Association to Bidirectional [560 bytes]
- (hist) Accountability Design [558 bytes]
- (hist) Diamond Problem [555 bytes]
- (hist) Nomenclature [554 bytes]
- (hist) Replace Magic Number with Symbolic Constant [540 bytes]
- (hist) Primitive obsession smell [532 bytes]
- (hist) Lazy class smell [530 bytes]
- (hist) Introduce common base class [520 bytes]
- (hist) Move common factors up the hierarchy [517 bytes]
- (hist) Avoid interface pollution [517 bytes]
- (hist) Replace Type Code with Class [516 bytes]
- (hist) Single choice principle [505 bytes]
- (hist) Robert Cecil Martin 1996b [501 bytes]
- (hist) Mujtaba's Initial Design [500 bytes]
- (hist) Introduce common data class [494 bytes]
- (hist) Replace Exception with test [493 bytes]
- (hist) 2010 frog design criticisms [492 bytes]
- (hist) Many to many association idiom [482 bytes]
- (hist) Replace Error Code with Exception [479 bytes]
- (hist) Extract Superclass [470 bytes]
- (hist) Alternative classes with different interfaces smell [470 bytes]
- (hist) Nelson Shaw Project Log [468 bytes]
- (hist) Beware singletons [468 bytes]
- (hist) Trygve Reenskaug [465 bytes]
- (hist) Inline Temp [465 bytes]
- (hist) Option-operand separation [464 bytes]
- (hist) Abstract class [462 bytes]
- (hist) Parameterise Method [460 bytes]
- (hist) Association versus Dependency [459 bytes]
- (hist) Replace Array with Object [451 bytes]
- (hist) Active record pattern [440 bytes]
- (hist) Beware of non-communicating methods [439 bytes]
- (hist) Agile methods [436 bytes]
- (hist) Cay Horstmann 2006 [432 bytes]
- (hist) Have courage [431 bytes]
- (hist) Add Parameter [430 bytes]
- (hist) Jim Coplien [429 bytes]
- (hist) Subclass [427 bytes]
- (hist) Square-rectangle problem [424 bytes]
- (hist) Rename Method [419 bytes]
- (hist) Interface [408 bytes]
- (hist) Parse tree design [408 bytes]
- (hist) Self Encapsulate Field [405 bytes]
- (hist) Avoid accidental multiple inheritance [404 bytes]
- (hist) How to assess [401 bytes]
- (hist) James Ashford Log [397 bytes]
- (hist) JUnit [392 bytes]
- (hist) Once and only once [391 bytes]
- (hist) Duplicate Observed Data [386 bytes]
- (hist) Divergent change smell [386 bytes]
- (hist) DMA Design Project - Source Code [383 bytes]
- (hist) Hillside Group [383 bytes]
- (hist) Introduce Local Extension [378 bytes]
- (hist) Inline Class [366 bytes]
- (hist) Replace Data Value with Object [365 bytes]
- (hist) Replace Constructor with Factory Method [361 bytes]
- (hist) Move Method [361 bytes]
- (hist) Robert Cecil Martin 1997b [360 bytes]
- (hist) Keep accessors and mutators separate [359 bytes]
- (hist) Extract Subclass [351 bytes]
- (hist) Replace Inheritance with Delegation [348 bytes]
- (hist) Collapse Hierarchy [345 bytes]
- (hist) Remove Setting Method [345 bytes]
- (hist) Erich Gamma [344 bytes]
- (hist) Replace Parameter with Explicit Methods [342 bytes]
- (hist) Make constructors blocking [338 bytes]
- (hist) Pull Up Field [336 bytes]
- (hist) No Global Variables [336 bytes]
- (hist) Move methods [334 bytes]
- (hist) Remove Parameter [330 bytes]
- (hist) Extract Interface [322 bytes]
- (hist) Exam questions [322 bytes]
- (hist) Vendor lock-in [318 bytes]