Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

Violations of this rule can be discovered with a heuristic checker in the style of FindBugs. As with all heuristic checks, achieving a low false-positive rate is essential.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4eada04c-97db-4b70-a282-c48c37b7cd95"><ac:plain-text-body><! [CDATA[ [[API 2006AA. References#API 06]]

[Class ClassLoader

http://java.sun.com/javase/6/docs/api/java/lang/ClassLoader.html]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a2334494-3825-43e0-8b70-7fd7a5b205ce"><ac:plain-text-body><![CDATA[

[ [Oaks 2001AA. References#Oaks 01] ]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9c3a975d-3541-441e-b563-c7d0f5783644"><ac:plain-text-body><![CDATA[

[[Security 2006AA. References#Security 06]]

 ]]></ac:plain-text-body></ac:structured-macro>

...

      14. Platform Security (SEC)      SEC08-J. Define wrappers around native methods