|
Java example source code file (WeakIdentityHashMap.java)
The WeakIdentityHashMap.java Java example source code/* * Copyright (c) 2005, 2008, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package com.sun.jmx.mbeanserver; import static com.sun.jmx.mbeanserver.Util.*; import java.lang.ref.Reference; import java.lang.ref.ReferenceQueue; import java.lang.ref.WeakReference; import java.util.Map; /** * <p>A map where keys are compared using identity comparison (like * IdentityHashMap) but where the presence of an object as a key in * the map does not prevent it being garbage collected (like * WeakHashMap). This class does not implement the Map interface * because it is difficult to ensure correct semantics for iterators * over the entrySet().</p> * * <p>Because we do not implement Map, we do not copy the questionable * interface where you can call get(k) or remove(k) for any type of k, * which of course can only have an effect if k is of type K.</p> * * <p>This map does not support null keys. */ /* * The approach * is to wrap each key in a WeakReference and use the wrapped value as * a key in an ordinary HashMap. The WeakReference has to be a * subclass IdentityWeakReference (IWR) where two IWRs are equal if * they refer to the same object. This enables us to find the entry * again. */ class WeakIdentityHashMap<K, V> { private WeakIdentityHashMap() {} static <K, V> WeakIdentityHashMap Other Java examples (source code examples)Here is a short list of links related to this Java WeakIdentityHashMap.java source code file: |
... this post is sponsored by my books ... | |
#1 New Release! |
FP Best Seller |
Copyright 1998-2024 Alvin Alexander, alvinalexander.com
All Rights Reserved.
A percentage of advertising revenue from
pages under the /java/jwarehouse
URI on this website is
paid back to open source projects.