再びWeakHashMap javadocから:
弱いキーを持つハッシュテーブルベースの Map 実装。WeakHashMap のエントリは、そのキーが通常使用されなくなったときに自動的に削除されます。より正確には、特定のキーのマッピングが存在しても、キーがガベージ コレクターによって破棄されること、つまり、ファイナライズ可能になり、ファイナライズされてから再利用されることを防ぐことはできません。キーが破棄されると、そのエントリは事実上マップから削除されるため、このクラスは他の Map 実装とは多少異なる動作をします。
私は次のように読みました: うん... WeakHaskMap にキーへの外部参照が残っていない場合、そのキーは GC され、関連付けられた値に到達できなくなる可能性があるため、(外部参照が直接存在しないと仮定して) GCの資格があります。
私はこの理論をテストするつもりです。これは doco の私の解釈にすぎません... WeakHashMap の経験はありませんが、「メモリセーフ」オブジェクトキャッシュとしての可能性があることがすぐにわかります。
乾杯。キース。
編集: WeakHashMapを探索しています...特定のキーへの外部参照によりそのキーが保持されるという私の理論を具体的にテストしています...これは純粋な問題です;-)
私のテストハーネス:
package forums;
import java.util.Set;
import java.util.Map;
import java.util.WeakHashMap;
import krc.utilz.Random;
public class WeakCache<K,V> extends WeakHashMap<K,V>
{
private static final int NUM_ITEMS = 2000;
private static final Random RANDOM = new Random();
private static void runTest() {
Map<String, String> cache = new WeakCache<String, String>();
String key; // Let's retain a reference to the last key object
for (int i=0; i<NUM_ITEMS; ++i ) {
/*String*/ key = RANDOM.nextString();
cache.put(key, RANDOM.nextString());
}
System.out.println("There are " + cache.size() + " items of " + NUM_ITEMS + " in the cache before GC.");
// try holding a reference to the keys
Set<String> keys = cache.keySet();
System.out.println("There are " + keys.size() + " keys");
// a hint that now would be a good time to run the GC. Note that this
// does NOT guarantee that the Garbage Collector has actually run, or
// that it's done anything if it did run!
System.gc();
System.out.println("There are " + cache.size() + " items of " + NUM_ITEMS + " remaining after GC");
System.out.println("There are " + keys.size() + " keys");
}
public static void main(String[] args) {
try {
for (int i=0; i<20; ++i ) {
runTest();
System.out.println();
}
} catch (Exception e) {
e.printStackTrace();
}
}
}
1回のテスト実行の結果(かなり困惑していると思います):
There are 1912 items of 2000 in the cache before GC.
There are 1378 keys
There are 1378 items of 2000 remaining after GC
There are 909 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 1961 items of 2000 remaining after GC
There are 1588 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 1936 items of 2000 remaining after GC
There are 1471 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1669 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1264 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1770 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1679 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1774 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1668 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 1834 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 2000 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 429 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
私のコードが実行されている間、キーはまだ消えているように見えます...おそらくGCヒントの後にマイクロスリープが必要です.GCに時間を与えるために. とにかく、この「ボラティリティ」は面白い挙動です。
編集 2:try{Thread.sleep(10);}catch(Exception e){}
うん、の直後に行を追加System.gc();
すると、結果が「より予測可能」になります。
There are 1571 items of 2000 in the cache before GC.
There are 1359 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
There are 2000 items of 2000 in the cache before GC.
There are 2000 keys
There are 0 items of 2000 remaining after GC
There are 0 keys
.... and so on for 20 runs ...
うーん... GC が作動すると完全に消えるキャッシュ... 実際のアプリでは任意のタイミングで... あまり役に立ちません... うーん... WeakHashMap は何のためにあるのでしょうか? ;-)
最後の編集、約束します
これが私のkrc/utilz/Random です(上記のテストで使用)
package krc.utilz;
import java.io.Serializable;
import java.nio.charset.Charset;
/**
* Generates random values. Extends java.util.Random to do all that plus:<ul>
* <li>generate random values in a given range, and
* <li>generate Strings of random characters and random length.
* </ul>
* <p>
* Motivation: I wanted to generate random Strings of random length for test
* data in some jUnit tests, and was suprised to find no such ability in the
* standard libraries... so I googled it, and came up with Glen McCluskey's
* randomstring function at http://www.glenmccl.com/tip_010.htm. Then I thought
* aha, that's pretty cool, but if we just extended it a bit, and packaged it
* properly then it'd be useful, and reusable. Cool!
* See: http://www.glenmccl.com/tip_010.htm
* See: http://forum.java.sun.com/thread.jspa?threadID=5117756&messageID=9406164
*/
public class Random extends java.util.Random implements Serializable
{
private static final long serialVersionUID = 34324;
public static final int DEFAULT_MIN_STRING_LENGTH = 5;
public static final int DEFAULT_MAX_STRING_LENGTH = 25;
public Random() {
super();
}
public Random(long seed) {
super(seed);
}
public double nextDouble(double lo, double hi) {
double n = hi - lo;
double i = super.nextDouble() % n;
if (i < 0) i*=-1.0;
return lo + i;
}
/**
* @returns a random int between lo and hi, inclusive.
*/
public int nextInt(int lo, int hi)
throws IllegalArgumentException
{
if(lo >= hi) throw new IllegalArgumentException("lo must be < hi");
int n = hi - lo + 1;
int i = super.nextInt() % n;
if (i < 0) i = -i;
return lo + i;
}
/**
* @returns a random int between lo and hi (inclusive), but exluding values
* between xlo and xhi (inclusive).
*/
public int nextInt(int lo, int hi, int xlo, int xhi)
throws IllegalArgumentException
{
if(xlo < lo) throw new IllegalArgumentException("xlo must be >= lo");
if(xhi > hi) throw new IllegalArgumentException("xhi must be =< hi");
if(xlo > xhi) throw new IllegalArgumentException("xlo must be >= xhi");
int i;
do {
i = nextInt(lo, hi);
} while(i>=xlo && i<=xhi);
return(i);
}
/**
* @returns a string (of between 5 and 25 characters, inclusive)
* consisting of random alpha-characters [a-z]|[A-Z].
*/
public String nextString()
throws IllegalArgumentException
{
return(nextString(DEFAULT_MIN_STRING_LENGTH, DEFAULT_MAX_STRING_LENGTH));
}
/**
* @returns a String (of between minLen and maxLen chars, inclusive)
* which consists of random alpha-characters. The returned string matches
* the regex "[A-Za-z]{$minLen,$maxLan}".
* @nb: excludes the chars "[\]^_`" between 'Z' and 'a', ie chars (91..96).
* @see: http://www.neurophys.wisc.edu/comp/docs/ascii.html
*/
public String nextString(int minLen, int maxLen)
throws IllegalArgumentException
{
if(minLen < 0) throw new IllegalArgumentException("minLen must be >= 0");
if(minLen > maxLen) throw new IllegalArgumentException("minLen must be <= maxLen");
return(nextString(minLen, maxLen, 'A', 'z', '[', '`'));
}
/**
* @does: generates a String (of between minLen and maxLen chars, inclusive)
* which consists of characters between lo and hi, inclusive.
*/
public String nextString(int minLen, int maxLen, char lo, char hi)
throws IllegalArgumentException
{
if(lo < 0) throw new IllegalArgumentException("lo must be >= 0");
String retval = null;
try {
int n = minLen==maxLen ? maxLen : nextInt(minLen, maxLen);
byte b[] = new byte[n];
for (int i=0; i<n; i++)
b[i] = (byte)nextInt((int)lo, (int)hi);
retval = new String(b, Charset.defaultCharset().name());
} catch (Exception e) {
e.printStackTrace();
}
return retval;
}
/**
* @does: generates a String (of between minLen and maxLen chars, inclusive)
* which consists of characters between lo and hi, inclusive, but excluding
* character between
*/
public String nextString(int minLen, int maxLen, char lo, char hi, char xlo, char xhi)
throws IllegalArgumentException
{
if(lo < 0) throw new IllegalArgumentException("lo must be >= 0");
String retval = null;
try {
int n = minLen==maxLen ? maxLen : nextInt(minLen, maxLen);
byte b[] = new byte[n];
for (int i=0; i<n; i++) {
b[i] = (byte)nextInt((int)lo, (int)hi, (int)xlo, (int)xhi);
}
retval = new String(b, Charset.defaultCharset().name());
} catch (Exception e) {
e.printStackTrace();
}
return retval;
}
}