LeetCode 350: intersection of two arrays II

Title: Given two arrays, write a function to calculate their intersection. Given two arrays, write a function to compute their intersection. Example 1: Input: nums1 = [1,2,2,1], nums2 = [2,2] Output: [2,2] Example 2: Input: nums1 = [4,9,5], nums2 = [9,4,9,8,4] Output: [4,9] Explain: The number of occurrences of each element in the output res ...

Posted by rubberjohn on Tue, 12 Nov 2019 03:55:08 -0800

netty source code parsing (4.0)-28 ByteBuf memory pool: pooledbybufalocator - assemble everything

Pooledbytebufalocator is responsible for initializing PoolArena(PA) and PoolThreadCache(PTC). It provides a series of interfaces to create PooledByteBuf objects that use heap memory or direct memory. These interfaces are just a skin. PA and PTC capabilities are fully used internally. The initialization process is divided into two steps, first i ...

Posted by Gente on Mon, 11 Nov 2019 22:43:58 -0800

Some key analysis tools of MySQL

Catalog pstack gdb strace perf pstack Get stack informationProblem thread positioningLow load mysql_pid=4522 pstack $mysql_pid>pstack.info PT PMP sorting stack information pt-pmp pstack.info | less You can also directly execute Pt PMP pt-pmp --pid 4522 as 10 __io_getevents_0_4(li ...

Posted by fatmart on Mon, 11 Nov 2019 15:09:47 -0800

Implementation of search and query of address book (alicloud mail) based on LDAP

In order to let users make good use of the new retail risk prevention and control center and provide convenience to users as much as possible Come on, what do you want? It's the address book of Alibaba cloud mailbox, which can query the email group interface. I'm also bothered by Alibaba cloud mail. You don't want any at present, neither HSF n ...

Posted by dlgilbert on Mon, 11 Nov 2019 11:27:16 -0800

Reachability analysis of Dijstra algorithm for heap optimization

1. Problem description Given a graph structure, including n points, e edges, given a search radius of 100000, solve all points with a distance of 100000 s from the source point. The distance here should still refer to the weight of. Data file "union.txt", format: start_id,end_id,weight,start_x,start_y,end_x,end_y 1 ...

Posted by mikosiko on Mon, 11 Nov 2019 10:38:28 -0800

Java reflection calls setter or getter's tool methods and tool classes (no exception handling required)

Catalog Tool method ------ reflection calling setter Tool method ------ reflection calls getter Tool class ------ reflection calls getter and setter Difference between tool class and tool method: Tool method is applicable to set and get the same object less times Tool class is applicable to set and get the same object mor ...

Posted by jamest on Mon, 11 Nov 2019 07:02:32 -0800

How do I do parameter checking in Spring/Spring Boot?All you need to know is here!

This article was originally created by the author. If it needs to be reproduced, please apply for opening it at the famous address at the beginning of the article and public number. springboot-guide : Spring Boot tutorials for beginners and experienced developers (maintenance in spare time is welcome). The importance of data validation goes b ...

Posted by houssam_ballout on Sun, 10 Nov 2019 16:53:48 -0800

Vue development summary and some best practices (Updated)

Basic development environment Project created by vue-cli3, vscode as a coding toolvscode plug-in recommendations: vscode plug in configuration Article directory Introduction to project directory structure UI framework selection main,js processing Axis request secondary encapsulation 1. Project directory structure ├── public // index.html ├── ...

Posted by anser316 on Sun, 10 Nov 2019 08:40:09 -0800

selenium + cloud calling code + Baidu ocr crawling 360's phone number mark

                        . As shown in the red box below. It mainly uses Python's beutifulsoup and selenium, as well as the cloud coding platform (360 will be required to input the verification code after frequent inquiry of f ...

Posted by graphic3 on Sun, 10 Nov 2019 08:11:31 -0800

C++ Implementation of Binary Tree Explanation and Common Operations

Binary Tree Padding - Tree In the previous articles, the linear table, stack, queue, string, and so on, which we have mainly introduced, are one-to-one linear structures. Today we are explaining "tree" is a typical non-linear structure. The feature of the non-linear structure is that the direct precursor of any node, if it exists, mu ...

Posted by beyers on Sat, 09 Nov 2019 20:13:18 -0800