On 6 August 2012 21:03, Jacob Nordfalk <[email protected]> wrote: > Its a limitation in the Java bytecode format itself: > A method can have only 64k bytecode instructions. > > A workaround would be to split the code up in several methods. > However, I think we first should look if the rule could be simplified or > something. as 64 thousand bytecode instructuions probably means the rule > contains over 5000-10000 comparisons and invocations, which I'd is way too > much > > > Jimmy, could you pastebin ./apertium_es_ast_es_ast_t1x.java somewhere so we > could have a look. >
Sure: https://gist.github.com/3278030 The java file is too large to fit into the page, so I isolated the individual rules. > > >> >> public void >> rule120__proclise__prnpro__prnpro__haber__verbir__a__inf_ger(Writer >> out, TransferWord word1, String blank1, TransferWord word2, String >> blank2, TransferWord word3, String blank3, TransferWord word4, String >> blank4, TransferWord word5, String blank5, TransferWord word6, String >> blank6, TransferWord word7) throws IOException >> >> ...if that helps at all. >> > > It helps, thx :-) > > Jacob > > -- > Jacob Nordfalk > javabog.dk > Androidudvikler og -underviser på IHK og Lund&Bendsen > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Apertium-stuff mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/apertium-stuff > -- <Sefam> Are any of the mentors around? <jimregan> yes, they're the ones trolling you ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Apertium-stuff mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/apertium-stuff
