1. top commands are commonly used.
Shift + m can be sorted by memory usage
Print out a java Process Using a pid) All 'object' in memory, such as the generated objects and their quantity ).Tools that can output all objects in the memory, or even heap
1. What I learned today is mainly the spring injection method. In addition to the constructor injection, there are also common set injection methods, in the configuration file, the configuration metadata of the set injection mode is .
2. Common
Chain Stack
Stack with chained Storage StructureThe time complexity of the push (), pop (), and peek () methods is O (1)
Java implementation:
Package com. ds. stack; public class external stack {/*** title: single-chain table class ** @ author zhb
Because the project needs to encrypt and upload files, it is inconvenient to use the SFTP service provided by the Linux system. Therefore, you need to implement a set of SFTP services by yourself. Here we use the SSHD Protocol implemented by MINA,
Category: Java
In some applications, one or more classes only need or can only have one instance. In this case, the Order Case mode is used. In windows, the spam recycle bin is a typical application, and there are many project configuration files.
This article includes:
List advanced
SubList Method
Queue interface and Queue List Implementation
Deque interface and consumer List Implementation
Stack operations
List Algorithm
Comparable Interface
Collections. sort Method
Comparator callback
I.
Json to Map mainly uses Google's Gson. The specific address is as follows:
Http://code.google.com/p/google-gson/
For example:
Public static void main (String [] args) {String jsonData = "{'name': 'Han mei', 'age': 21}"; Map map = parseData
The title name may be a bit confusing. It seems that I am talking about some profound questions. In fact, I mainly talk about several methods. As for the accuracy of the content I'm talking about, it is hard for me to ensure that, after all, I am
1. the java project has not imported a third-party jar package
Packaging is simple at this time:
1. Open the project in Eclipse, right-click the project, and select "Export ";2. Select Java/JAR file and Next;3. In Select the resources to export, you
In java, there is a variable called the class type, which is different from the method for storing the value of the basic type variable. Both basic variables and class variables are implemented as a memory location. However, because the amount of
We often encounter garbled characters in the database when writing code in jsp...
My solution: In the first line of jsp, Set
Of course, you also need to modify the string when writing it, for example:
String nickname = req. getParameter
What are the functions of filters I know?
1-character Transcoding
Request. setCharacterEncoding ("UTF-8 ");
2. Access Determination
Determine whether there are any illegal operations by using the value in the session
3-character filtering
$ (Function () {var $ div_li = $ ("# tab-tt ul li"); $ div_li.click (function () {$ (this ). addClass ("active2") // highlight the current element. siblings (). removeClass ("active2"); // remove the highlighted var index of elements of other
I have long had doubts about the hashCode and equals methods, and I have never been able to solve them. Today I remember Baidu, But I did write it in my own words, so it should be original.
Values in HashSet or HashMap cannot be repeated. Let's
Today, I saw Trie's principles. I thought of a question I had not answered in my previous interview. I 'd like to try it out by writing some code.
A typical Trie application is used for statistics and sorting, and to query a large number of strings,
Java. util. concurrentClass ThreadPoolExecutor
Usage: Create a ThreadPoolExecutor object based on the constructor and execute the task.
Constructor:
Public ThreadPoolExecutor (int corePoolSize, // core processing pool capacity, the pool will keep
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.