Jump to content
  • 0

Question

Posted

Hello cheaters.

 

I'm trying to adapt some things on aCis and as you know it uses java 8 and instead FastMap it needs HashMap and istead FastList it needs ArrayList.

 

So everytime I replace imports I have some methods which HashMap/ArrayList doesn't have or have another method .for example

 

10ce47b79c.jpg[/img]

 

What are similar methods for these in HashMap? or how can I change it?

 

Thanks in advance.

 

 

 

10 answers to this question

Recommended Posts

  • 0
Posted

Use merge or compute methods for first cases. You can replace the whole for loop content for merge (!containsKey part included)

 

http://java.boot.by/ocpjp8-upgrade-guide/ch06s03.html

 

http://codereview.stackexchange.com/questions/57078/more-elegant-way-to-increment-integers-in-map

entries.merge(vote, 1, (oldValue, one) -> oldValue + one);

About max and result, simply = 0. It iterates over whole map to find values anyway...

  • 0
Posted

If you actually understand what a map and a list is then you can pretty much do it yourself.

If I understand I wouldn't ask a question  :happyforever:

  • 0
Posted

If I understand I wouldn't ask a question  :happyforever:

FastMap.Entry head()
Returns the head entry of this map.
FastMap.Entry getEntry(java.lang.Object key)
Returns the entry with the specified key.

 

Its pretty clear i think. 

  • 0
Posted (edited)

Use merge or compute methods for first cases. You can replace the whole for loop content for merge (!containsKey part included)

 

http://java.boot.by/ocpjp8-upgrade-guide/ch06s03.html

 

http://codereview.stackexchange.com/questions/57078/more-elegant-way-to-increment-integers-in-map

entries.merge(vote, 1, (oldValue, one) -> oldValue + one);

About max and result, simply = 0. It iterates over whole map to find values anyway...

Thanks for response!

 

Sorry for dumb question one more but the final result must be

 

12d5bdee04.jpg[/img]

 

Like this?

Edited by Gam3Master
  • 0
Posted
 temp = null;

 it's pointless. It's the goal of a GC to handle object deletion by itself. Otherwise yup, try and see.

 

Thanks understood. 

 

Thats the case if HashMap is <Integer, Integer> but what if its <L2PcInstance>?

  • 0
Posted

Thanks understood. 

 

Thats the case if HashMap is <Integer, Integer> but what if its <L2PcInstance>?

 

If that would be a problem, there would have OutOfMemoryException everywhere (or at least cycles would be shorter and shorter and shorter) on aCis.

 

WeakHashMap and WeakReference exist, but if your GC runs while you retrieve your list, you can end with funny results depending how you gonna use it.

Guest
This topic is now closed to further replies.


  • Posts

    • https://web.archive.org/web/20260306183214/https://maxcheaters.com/topic/241828-l2j-l2damage/page/3/ https://l2topzone.com/forum/l2-server-support-problems/9/l2damage-stopped/30514 Also we will try to push longer seasons ever ! (1135-100)/9 = 115 online
    • ONE SIDE – AND EVERYTHING BREAKS ▪ Looks like a simple case: Florida DL, back side, barcode – “clean and minimal”. ▪ In reality, these are exactly the tasks that fail most often. – data provided as plain text – request only for the back side – focus on the barcode (PDF417) ▪ And here’s the key point: ▪ A barcode is not just a “picture on the back”. It’s compressed logic of the entire document. ▪ If it doesn’t match the front, format, and data structure – the system flags it instantly. ▪ Many create a “similar-looking” code. But systems don’t read “similar” – they read by specification. ▪ In cases like this, it’s not about design. It’s about correct data assembly and how it behaves inside the format. ▪ Today only – 15% off for verification cases. ▪ Want it to pass, not just look right? Describe your case – we’ll show where even clean files break. › TG: @mustang_service ( https:// t.me/ mustang_service ) › Channel: Mustang Service ( https:// t.me/ +JPpJCETg-xM1NjNl ) #editing #photoshop #documents #verification #case
    • Your anonymity is a corpse. Blockchain forgets nothing. Your transactions are direct footprints in the hands of anyone who takes an interest. [✘] Still believe in "mixing"? Forget it. Classic Bitcoin mixers are an illusion of security. For Chainalysis and Elliptic algorithms, any attempt to hide tracks in the ledger is transparent. Your "mixing" is an artifact that gets filtered out in seconds. Every transaction leaves a trail that leads to frozen assets or unwanted questions from exchanges.  We don't mix. We break the link. [-] Input: Your "dirty" coins (Dirty BTC/ETH) with all their history and digital markers stay with us. [+] Output: You receive absolutely clean assets (Clean Crypto) from our reserves, which have never intersected with your past. This isn't a game of hide and seek. This is the surgical removal of your financial history from the system.   ------------------------------------------------------------------- Technical indexing: Bitcoin Mixer, Crypto Mixer, Clean BTC, Clean ETH, Anti-Chainalysis, Best Bitcoin Mixer, Anonymous Crypto Exchange, NoLog Mixing Service.
    • Here you are: https://l2crypt.com/l2-tools/l2editor-source/
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..