...
Violations of this rule can be discovered with a heuristic checker in the style of FindBugs. As with all heuristic checks, achieving a low false-positive rate is essential.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4eada04c-97db-4b70-a282-c48c37b7cd95"><ac:plain-text-body><! [CDATA[ [[API 2006AA. References#API 06]] | http://java.sun.com/javase/6/docs/api/java/lang/ClassLoader.html] | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a2334494-3825-43e0-8b70-7fd7a5b205ce"><ac:plain-text-body><![CDATA[ | |
[ [Oaks 2001AA. References#Oaks 01] ] |
| ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9c3a975d-3541-441e-b563-c7d0f5783644"><ac:plain-text-body><![CDATA[ | |
[[Security 2006AA. References#Security 06]] | ]]></ac:plain-text-body></ac:structured-macro> |
...
14. Platform Security (SEC) SEC08-J. Define wrappers around native methods