to be met, simplicity, and performance.
There is often a mutual constraint between simplicity and performance. When implementing a synchronization strategy, be sure not to blindly sacrifice simplicity for performance (which could compromise security).
When using a lock, you should be aware of the functionality implemented in the code block and whether it will take a long time to execute the code block. Whether you are performing a computationally intensive operation or performing
Today finally again picked up the Java Concurrency in practice, before the abuse of the pieces, before reading this book, there is a part of their own code I did not realize that the thread is not safe, but also really want to be bad to fill this knowledge.1.Java Monitor ModeMonitor mode is very simple, is to use a private object lock or built-in lock to ensure t
dynamically invoking objects using reflection, such as a Addsaray method in the employee class, we look at how to invoke:Class C3 = Class.forName ("Employee"), Object E3 = C3.newinstance (); Field Fsaray = C3.getdeclaredfield ("Saray"); Fsaray.setaccessible (true); Fsaray.set (E3, 10000); System.out.println (Fsaray.get (E3)); Output 10000//get Methodmethod m = C3.getdeclaredmethod ("Addsaray", double.class);/* * Method m = C3.getdeclaredmethod (" Addsaray "); Method m2 = * C3.getdeclaredmethod
-h option for top is clearly stated: All thread information below this process will be printed. That is, a program that launches multiple threads, the next thread in Linux will correspond to a process!At this point, we can use Jstack to further analyze the thread's dump file:650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/7E/D5/wKioL1cKJhiDetsKAACWujw9FVA711.png "title=" Sogou _ 2016-04-10_17-59-49.png "alt=" Wkiol1ckjhidetskaacwujw9fva711.png "/>We can easily get the names of these t
)
Instantiation (in the case of an inner class, pay particular attention to the instantiation method, which can be referenced by using new and reflection to produce an instantiated object of the Java inner Class)
Sign in to map
Static{Reflections Reflections =NewReflections ("Prepare");//Package name, can reduce the search scopeset for(classintIDX = Typename.lastindexof ("$");//inner class scene intIDX1 = Typename.lastindex
) { System.out.println ("---" +invokername+ "----" +adb); } }
The output is:---452345234----q31234132
Articles you may be interested in:
Analysis of private attribute inheritance problem in PHP class
Query for private access control in PHP classes and objects
public,private,protected Differences in PHP class and example analysis
An analysis of PHP object-oriented public private protected access modifier
is the private modifier in Java
Address: http://blog.csdn.net/kongxx/article/details/7259827
One of Java Socket practices: Single-thread Communication
Java Socket practice 2 multi-thread Communication
Previous two articlesArticleThis article describes how to establish Java Socket communication, and describes how to use
Java Drp project practice-Servlet, drpservletOrigin
Before explaining the Servlet, we need to first introduce a word CGI, that is, the Common GatewayInterface is the meaning of a universal gateway interface, which provides an interface for a computer program with the HTTP protocol or WWW Service, that is, the meaning of the human-computer interaction interface. When a Web application runs on a server and a
The Java language may be the most widely used programming language that relies on garbage collection, but it is not the first. Garbage collection has become an integral part of many programming languages, including Lisp, Smalltalk, Eiffel, Haskell, ML, scheme, and Modula-3, and has been in use since the early the 1960s. In this article in Java theory and Practice
method that can be declared private or protected is declared as public. But unlike FindBugs, it uses bytecode analysis and many built-in bug pattern detectors to find common bugs in your code. It can help you find out where your code is intentionally or unintentionally deviating from good design principles. (For an introduction to FindBugs, see Chris Grindstaff's article, "FindBugs, part 1th: Improving code Quality" and "FindBugs, part 2nd: Writing custom detectors.") )
Design recommendations
are those that process asynchronous event scheduling. In this column's July article, we studied thread pools and work queues, and how many Java applications use the runnable queue mode to schedule small work units.
You can simply create a new thread for a task to derive the backend thread that executes the task. This method is very attractive:
New thread (New runnable () {...}). Start ();
Although this practice
to IdeaIf it is much easier to add the JAVAP command to the compiler to view the bytecode file, here's how to add the JAVAP command to idea:(1) Open the Setting menu,(2) Find the Extension tool in the tool click Open,(3) Click the Green Plus button in the upper left corner of the left area to pop up an edit box like this, enter as prompted,(4) Click OK after completion, click on the setting window of apply and OK, to here has completed the JAVAP command to add,(5) View the added commands and ru
@override inside the retention set to source, compiled successfully do not have the information of these checks, on the contrary, @Deprecated inside the retention set as runtime, This means that in addition to being warned at compile time which deprecated method is used, it is possible to find out whether the method is deprecated when executed.3) @DocumentedInclude this note in the Javadoc4) @InheritedAllow subclasses to inherit annotations from parent class4.Use@Description (value= "instance u
The final keyword is often misused-it is overused when declaring classes and methods, but is not used when declaring instance fields. This month, Java practitioner Brian Goetz explored some guidelines for the effective use of final.
Like the const keyword in its "cousin"-C, final means something different according to the context. The final keyword can be applied to a class, method, or field. When applied to a class, it means that the class cannot be
In the current java World, many things are called x×let, and x×let all mean small programs. For example, applet applications, servlet server-side applets, mini programs in the midlet mobile phone, and small programs in the portlet portal container. In this section, we will introduce the applet. This is not a lot of things, but it makes sense in the java architecture. This item can be run in a browser and ca
Mathematics 5 Zhao Society]Table [key=c005, Rest= World Modern History 2 Chen]Table [key=c006, Rest=java programming 8 Lin]-----------------------------------------Enter the number to select the function:1: Find the course according to the course number;2: Delete the course according to the course number:3: Add a course record to the curriculum:4: Show all course records in curriculum5: Revise curriculum record in curriculum-1: Exit------------------
Java's JVM Learning note Five (practice writing your own class loader)Course Source: http://download.csdn.net/detail/yfqnihao/4866501In the third and fourth sections we have been emphasizing that class loaders and security managers can be dynamically extended, or that they can be customized by the user, and today we are trying to do this part of the practice, of course, before reading this article, at least
First, the use of Java practice algorithms often need to use the console's data input and output, the following record the basic use of the method:Basic usage1 ImportJava.util.*;2 Public classMain {3 Public Static voidMain (string[] args) {4Scanner cin =NewScanner (system.in);//Common scanner classes to get data5 intA = Cin.nextint ();//converts the input data to an int type assigned to a, the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.