Stuff I do

Here, I post stuff that i have got chance to explore. I put in the links to the articles that i find most suitable, and as i explore the topic more i add my own comments as well.

Saturday, 7 April 2012

WeakReferences in Java/Android

http://weblogs.java.net/blog/2006/05/04/understanding-weak-references

http://www.codeinstructions.com/2008/09/weakhashmap-is-not-cache-understanding.html

http://www.ibm.com/developerworks/java/library/j-jtp11225/
Posted by jaisrik at 11:11
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Android, java

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Labels

adobe algorithms amazon Android architecture awk AWS c++ commands contest ques CSS design pattern disk cloning django ebay eclipse entrepreneur facebook flipkart function programming GAE gc git google hacking hadoop Interesting stuff interview question IPC j2ee java jni linux low latency mac machine learning magento mahout maths memcache microsoft mysql networks nm nutch open source partition performance probability programming python R regex rsync scala security shell shell scripting solr SPOJ spring SQL statistics tips and tricks to be solved tomcat topcoder tower research Twitter vi vimdiff virtualenv web app windows

Popular Posts

  • Setting up SVN on AWS EC2 instance
    Steps to setup the SVN repository on the cloud instance ( http://www.ange-agostini.com/blog/it/5-minutes-to-set-up-a-subversion-server-in-t...
  • Read an HDFS file functional way in scala
    This example reads an HDFS file in scala in a functional manner. We use Stream class to read data lazily when required. val path = ne...
  • Probability and the chessboard horse
    A horse is in chessboard. given its x,y find the probability through program that it will remain in board after n moves. http://www.care...
  • Boyer-Moore Majority Vote Algorithm
    Given an array A[N] of integers, find the major element in the array or return -1 if no major element exists in the array. An element '...
  • Gunzip the *.gz files on hadoop HDFS
    If you have some gzipped files (*.gz) on your HDFS and you don't want to bring them on local disk for unzipping you can do it as follow...
  • Median of medians algorithm
    If n is small, for example n<6, just sort and return the k'th smallest number.( Bound time- 7) If n>5, then partition the numbe...
  • vimdiff tips and tricks - how to copy between two screens
    do  (diff obtain) and  dp  (diff put) is what you need. Here is a small list of other helpful commands in this context. ]c ...
  • Find smallest +ve no. missing from the array
    Original link: http://www.careercup.com/question?id=12708671 You are given an unsorted array with both positive and negative elements. Yo...
  • Using Memory Mapped files in Java
    When two processes map the same file in memory, the memory that one process writes is seen by another process, so memory mapped files can b...
  • Given two sorted linked lists. Find the path of maximum sum.
    Given two sorted linked lists. You start with a one of the two lists and then move till the end. You may switch to the other list only at t...

Categories

  • adobe (2)
  • algorithms (4)
  • amazon (3)
  • Android (3)
  • architecture (1)
  • awk (6)
  • AWS (2)
  • c++ (3)
  • commands (14)
  • contest ques (6)
  • CSS (2)
  • design pattern (5)
  • disk cloning (1)
  • django (1)
  • ebay (1)
  • eclipse (1)
  • entrepreneur (1)
  • facebook (1)
  • flipkart (2)
  • function programming (1)
  • GAE (1)
  • gc (1)
  • git (1)
  • google (3)
  • hacking (4)
  • hadoop (7)
  • Interesting stuff (15)
  • interview question (64)
  • IPC (1)
  • j2ee (1)
  • java (24)
  • jni (1)
  • linux (24)
  • low latency (1)
  • mac (2)
  • machine learning (2)
  • magento (1)
  • mahout (1)
  • maths (2)
  • memcache (1)
  • microsoft (2)
  • mysql (1)
  • networks (5)
  • nm (1)
  • nutch (2)
  • open source (1)
  • partition (1)
  • performance (2)
  • probability (2)
  • programming (15)
  • python (14)
  • R (1)
  • regex (3)
  • rsync (1)
  • scala (2)
  • security (1)
  • shell (2)
  • shell scripting (22)
  • solr (1)
  • SPOJ (1)
  • spring (3)
  • SQL (3)
  • statistics (1)
  • tips and tricks (2)
  • to be solved (4)
  • tomcat (2)
  • topcoder (6)
  • tower research (1)
  • Twitter (1)
  • vi (2)
  • vimdiff (1)
  • virtualenv (1)
  • web app (7)
  • windows (3)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  March (2)
  • ►  2016 (6)
    • ►  October (2)
    • ►  July (1)
    • ►  May (2)
    • ►  March (1)
  • ►  2015 (2)
    • ►  September (1)
    • ►  January (1)
  • ►  2014 (6)
    • ►  November (3)
    • ►  October (1)
    • ►  June (1)
    • ►  March (1)
  • ►  2013 (37)
    • ►  December (1)
    • ►  September (3)
    • ►  July (2)
    • ►  June (3)
    • ►  May (5)
    • ►  April (5)
    • ►  March (6)
    • ►  February (6)
    • ►  January (6)
  • ▼  2012 (111)
    • ►  December (9)
    • ►  November (7)
    • ►  October (14)
    • ►  August (13)
    • ►  July (10)
    • ►  June (13)
    • ►  May (16)
    • ▼  April (13)
      • Java Data Objects (JDO)
      • Spring Web MVC step by step tutorial
      • Change grub boot order
      • Using Strace in linux
      • Spring container in java
      • SCP and SSH without password
      • Find all files recursively in the current director...
      • Check the memory used by a unix process
      • Java Heap analysis using jdk tools
      • WeakReferences in Java/Android
      • How to access the android UI thread from other thr...
      • Andorid Service vs AsyncTask vs Handler
      • Universally unique identifier (UUID)
    • ►  March (16)

Total Pageviews

Simple theme. Powered by Blogger.