Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="21c038cea523813f-efa95a0f-4d6544d4-a4ff91d1-17422b410d66ceed82e87e1e"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

[Class Calendar

http://download.oracle.com/javase/6/docs/api/java/util/Calendar.html]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b891b225ef669f3f-9601f33e-4e334300-acef883d-9258536d2b700fdc512a118c"><ac:plain-text-body><![CDATA[

[[Bloch 2008

AA. Bibliography#Bloch 08]]

Item 16: "Favor composition over inheritance"

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c0998634a667c5ed-8094f4ed-45864436-b68c87eb-f820311d5e939ddc6e57a3f4"><ac:plain-text-body><![CDATA[

[[Gamma 1995

AA. Bibliography#Gamma 95]]

Design Patterns: Elements of Reusable Object-Oriented Software

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="66d5f12e66a977db-dee35bb4-4b0b445a-953eaf11-311ab612fe802140de2b12fc"><ac:plain-text-body><![CDATA[

[[Lieberman 1986

AA. Bibliography#Lieberman 86]]

Using prototypical objects to implement shared behavior in object-oriented systems

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3a674a8c130f7d89-46c07ace-4890410b-bcb5b173-8f1de4c80c3982ce355e6dc3"><ac:plain-text-body><![CDATA[

[[SCG 2007

AA. Bibliography#SCG 07]]

Guideline 1-3 Understand how a superclass can affect subclass behavior

]]></ac:plain-text-body></ac:structured-macro>

...

OBJ06-J. Compare classes and not class names      04. Object Orientation (OBJ)      OBJ08OBJ04-J. Provide mutable classes with copy functionality to allow passing instances to untrusted code safely