包含标签:Java 的文章
-
Explain the construction method call under Java inheritance in detail
Explain the construction method call under Java inheritance in detail When creating an object of a class in Java, if t…… -
Java implementation of two-dimensional array transpose method example
This paper describes the method of two-dimensional array transpose in Java. Share with you for your reference, as foll…… -
Java design fine-grained implementation code based on concurrent HashMap
Fine grained locks: Several locks in Java: synchronized, reentrantlock and reentrantreadwritelock can basically meet t…… -
Detailed example of Java singleton mode
Detailed example of Java singleton mode Concept: Singleton pattern is a common design pattern in Java. There are three…… -
Explain mybatis foreach collection example
In the process of SQL development, dynamic construction of in set condition query is a common usage. The foreach funct…… -
On zookeeper open source client framework curator
zookeepercurator Cursor is an open source zookeeper client framework of Netflix In the process of using zookeeper, Net…… -
Ikanalyzer combines Lucene to realize Chinese word segmentation (example explanation)
1. Basic introduction With the more and more extensive application of word segmentation in the field of information re…… -
Four optimization methods of Java virtual machine for internal lock
Since Java 6 / Java 7, the Java virtual machine has optimized the implementation of internal locks. These optimization…… -
Struts 2 configuration action details
After implementing the action processing class, you can Configure the action in XML to let the struts 2 framework know…… -
On the significance of rewriting toString () method in Java programming
In the previous article, we introduced the code example of Java toString method rewriting. Next, we briefly talk about…… -
Access to domains and static methods based on Java does not have polymorphism (example explanation)
1. Associating a method call with a method body is called 2. Compile time binding (static) determines the type of refe…… -
Brief analysis on the opening and closing of eclipse debug mode
By default, right-click debug in eclipse. When running to the set breakpoint, it will automatically jump to the debug …… -
Introduction to common tool classes under Java language Lang package
No matter where you are developing Java applications, you have to write a lot of tool classes / tool functions. You kn…… -
Java uses future to get multithreading results in time
The future interface is a part of the Java standard API util. In the concurrent package. The future interface is the i…… -
Detailed explanation of Java set class source code analysis
Like list, set inherits from the collection interface. The commonly used implementation classes are HashSet and TreeSe…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
Example of using JSP in spring boot practice
The front-end and back-end separation architecture has its advantages, but according to the specific situation, it is …… -
Brief introduction to Java singleton mode
1、 Concept Singleton pattern is a common software design pattern. Its core structure contains only a special class ca…… -
On the wonderful use of future in Java multithreading (with source code)
In Java, future is a future object, which stores the processing results of this thread. It is like a delivery voucher.…… -
Decoration pattern of Java design pattern learning
Decoration mode: dynamically add some additional responsibilities to an object. In terms of adding functions, decorati…… -
Strategy model of Java design pattern learning
Policy mode: policy mode is a method to define a series of algorithms. The work completed by the algorithms is the sam…… -
Read the configuration parameter instance in the XML file
paras. XML file SysParam.@ R_ 502_ 1713 @ file use Reference package required The above example of reading configurati…… -
Code example of Java crawling mailbox from the Internet
Web crawler: in fact, it is a program used to obtain data conforming to specified rules on the Internet. summary Jsup …… -
Several ways to implement action in struts 2
Action is used to process user requests, so it is also called business controller. Each action class is a work unit. T…… -
Quickly understand hibernate configuration files and mapping files
Hibernate is a thorough ORM (object relational mapping) open source framework. Let's take a look at the high-level vie…… -
Preventing unlisted users from operating — a simple implementation based on struts 2 interceptor
Generally, our web applications are allowed to operate only after the user logs in, that is, we do not allow non login…… -
Factory method pattern for Java design pattern learning
Factory method: define an interface for creating objects, and let subclasses decide which class to instantiate. Factor…… -
The Jackson entity turns JSON to null or empty and does not participate in serialization (example explanation)
When using Jackson for serialization, we often encounter that the attribute of an entity object in the background is n…… -
Explain in detail how JSTL in Java Web circulates map data in list
Explain in detail how JSTL in Java Web circulates map data in list The first way: 1: Background code (test) 2: Front p…… -
Java implementation of two-dimensional array to JSON method example
This paper describes the method of converting two-dimensional array to JSON in Java. Share with you for your reference…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
Futuretask source code analysis (recommended)
Futuretask only implements the runnablefuture interface: @ h_ 404_ 1@ This interface inherits Java Lang. runnable and ……