Beautiful Code [365]
constants
hexadecimals in C
constructors (methods)
container_of macro
casting back from core kobject to main struct device
content-addressable memory 2nd
context-sensitive menu selection in eLocutor long click 2nd 3rd 4th
context-sensitive semantics 2nd
continuous testing
conversions between s-expressions and syntax objects
cookies
CGI script data storage
key into user table for Gene Sorter
core dump 2nd 3rd 4th
CPython
selecting storage function dynamically
critical path
Crockford
Crypt::GPG module (Perl)
security audit 2nd 3rd 4th
Crypt::PGP5 module (Perl)
cryptographic software
Cryptonite (mail system) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
basic design
code cleanup
decrypted messages
design goals and decisions
functioning prototype
insights from development process
integrated interface for key management
mail store
revamping the mail store
securing the code
test suite
Cryptonite::Mail::Config module (Perl)
Cryptonite::Mail::HTML package
Cryptonite::Mail::Server
Cryptonite::Mail::Service class
CSA (carry-save adder) circuits 2nd 3rd 4th 5th 6th
CSS2
early implementation by Emacs W3 browser
Cunningham
Cypherpunks
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
data display debugger (ddd)
data management (MER Mission)
data movement through the memory hierarchy 2nd
data representation
data structures as frozen algorithms
data types
C++ parameterized types
Haskell
distinguishing actions from pure values
skipping declarations when unnecessary
database code
database schemes
databases
ERP5 relational database
in operating system kernel for device naming
datum->syntax procedure (syntax-case) 2nd
converting s-expression to syntax object
DBD::Recall module (Perl)
DBD::SQLite module (Perl)
DCWorkflow
ddchange plug-in for Eclipse
ddd (data display debugger)
de Carvalho 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
deadlock
explicit locking code in bank account program
single-thread deadlock
Dean 2nd 3rd
debugging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
a debugger
delta debugging 2nd 3rd
finding failure cause automatically
hunting the defect 2nd 3rd 4th
finding failure causes in program state
tracing failure-causing variables back to statements causing them
declarations
decompositional approach to solutions for dense linear systems
decrypted email messages
DECTalk Express
define-syntax form
defining new variables in a scope (JavaScript parser)
Delivery class
DeliveryLine class
delta debugging 2nd 3rd 4th
on program states
searching for failure causes in program
input
delta editor (Subversion) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
benefits of
interface 2nd 3rd 4th
dense linear systems
dense matrix problem
dentry structure (Linux)
depot
design defects manifesting as bugs
destination_project base category
devfs filesystem
device structure (Linux)
memory usage
reference counting
devices (on Linux)
no proper handling in persistent manner
struct device as base class
DGEMM routine
DGETF2 routine
bottleneck in computers with faster processors
dictionaries 2nd 3rd 4th 5th 6th
basic operations on
C implementation of Python
collisions
iterations and dynamic changes
keys and values of different data types in single dictionary
keys not ordered
passing keyword arguments to a function
representing module contents
resizing
determining new table size
special-case optimization for small hashes
special-casing
diff tool
digital filters
fast digital filter algorithm
generating code for elements
digital image filters
sharpness filter
direction (genomic features)
directory trees
differences
version control and tree transformation 2nd 3rd 4th
disabled persons
eLocutor 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
future directions
dispatcher state of threads in Solaris
distance procedure (Lisp)
distributed programming with MapReduce