IntroductionThis article is the second article in the Java Performance Analysis tool series, the first article: Operating system Tools. In this article, you will learn more about Java applications and the JVM itself using built-in Java monitoring tools. There are many built-in tools in the JDK, including:
Jcmd
Java NIO: Analysis of the I/O model and nio Analysis
Notes for learning Java !!!If you have any questions or want to obtain learning resources during the learning process, join the Java learning exchange group: 618528494 let's learn Java
not: reference counting method and the algorithm of accessibility analysis . Reference Counting Method
The logic of the reference counting method is very simple, but there is a problem, Java does not use this way to make object survival judgments.
The logic of the reference notation is to maintain a counter counter at the head of the object when it is stored in the heap, and counter++ if an object adds a r
An analysis of a bug in the analysis and solution of C + + and Java Chinese garbled problemDionysoslai ([email protected]) 2014/10/21In the previous several blog "about C + + and Java Chinese garbled problem analysis and resolution," The address is as follows: http://blog.cs
Java list source code analysis, list source code analysis
Three Data Structure linked lists, trees, and graphs. As one of them, the sequence table is the longest used in programming. The List interface is the implementation of sequence tables in java. It has many subinterfaces and implementation classes, which are very
user login, output user information, manage cart, etc. ; Other session EJBs provide some common methods, such as generating unique identifiers, and so on. The traditional JavaBean component has evolved into a value object, transferring data between EJB components and applications, successfully processing the encapsulation of each object, effectively reducing the difficulty of programming. XML document classes are used to process order information.
The WAF of this example is an effective implem
Java concurrent series of AbstractQueuedSynchronizer source code analysis (summary analysis ),
To learn Java concurrent programming, you have to understand the java. util. concurrent package. This package contains many frequently used concurrent tool classes, such as Reentra
Dynamic proxy principle (for sample code, see Java reflection mechanism analysis (3 ))
A) understand the process of the above dynamic proxy example
B) proxy interface implementation class source code analysis
Let's take a look at the source code of the proxy implementation class ($ proxy0) and the entire dynamic proxy process.
The code generated by $
Learn Java concurrency programming have to understand java.util.concurrent this package, this package has many of the concurrency tools we often use, such as: Reentrantlock, Countdownlatch, Cyclicbarrier, Semaphore and so on. The underlying implementations of these classes depend on the Abstractqueuedsynchronizer class, which shows the importance of this class. So in the Java Concurrency Series I first abst
In-depth analysis of Java I/O class features and application scenarios, in-depth analysis of application scenarios
There are more than 40 classes related to input and output in Java. If the relationship between them is not clarified, they cannot be used flexibly.
If the stream flow is divided, it can be divided into th
Yesterday I wrote a simple chat about the simple memory partitioning of the Java Execution program, and today we'll talk about memory analysis of static variables and methods.The first feature of 1.static variables and methods memory analysisThe first attribute of the STATIIC variable and method is called by the class name, the static variable, and the class name. The static method is invoked in the form of
[Java Collection source code analysis] TreeMap source code analysis
Reprinted please indicate the source: http://blog.csdn.net/ns_code/article/details/36421085
Preface
This article does not intend to extend the style of the previous articles (add comments to all source code), because we need to understand all the source code of TreeMap. For bloggers, it really ta
from Destpos to Destpos+length-1. Because it is a native method, it is not visible in the JDK, but you can view the source code in the OPENJDK. The function actually eventually calls the C language's memmove () function, so it can guarantee the correct copying and movement of elements within the same array, which is much more efficient than the general method of replication, and is well suited for batch processing of arrays . Java strongly recommends
, similar to the string to implement the method itself.equals of JDK1.7 ()public boolean equals (Object anobject) {if (this==anobject) {return true;}if (anobject instanceof String) {String anotherstring = (string) anobject;int n=value.length;if (n==anotherstring.value.length) {Char V1[]=value;Char v2[]=anotherstring. Value;int i=0;while (n--! =0) {if (V1[i]!=v2[i])return false;i++}return true;}}return false;}Note: The code logic for either 1.6 or 1.7,string.equals () is roughly the following:(1)
ServletA servlet (server Applet) is the abbreviation for a Java servlet, called a small service or service connector, which is a server-side program written in Java that is designed to interactively browse and modify data to generate dynamic Web content.servlet container
servlet container startup process:In the Tomcat container management hierarchy, the context directly manages the wrapper class wr
("Mdzz"); -System.exit (0);121 }122SYSTEM.OUT.PRINTLN ("Proposition formula to be converted:" +problem);123System.out.println ("The following is the corresponding truth table");124System.out.println ("Main collection paradigm:" + getmainnormalform (problem, 1)); theSystem.out.println ("Main disjunction paradigm:" + getmainnormalform (problem, 2) + "\ n");126 }127 - }129}The basic ideas are:
First, engine.eval (problem); You can run the string directly as a math
expansion of the original twice times.Iteratorsprivate abstract class HashIteratorIn fact, the implementation of the iterator in the collection implementation of the class are similar, as long as you see one on it. This also records the number of changes expectedmodcount, that is, after the iterator is created, it is not possible to iterate during the modecount++ such operations, or appear fail-fastSerialization and deserialization-saving and reading the state of HashMapprivate void WriteObject
the data on the server. The specific process is as follows:
Client requests a protected resource for the server
The server sends a request to the client to request username and password.
Client sends user name and password to server
The server returns the appropriate data to the client
This authentication method is not secure, the client sends the user name and password is Base64 form encrypted text, this situation of the user name and password is exposed, if someone c
Objective
This article does not intend to extend the previous several styles (add the annotation to all source code), because to understand all the source code of TreeMap, for bloggers, it does take a lot of time and experience, it seems unlikely to have so much time to invest, Therefore, this is intended to be through the reading source to the TreeMap has a macro grasp, and some of the implementation of some methods to do a more in-depth analysis.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.