On Wed, 2011-10-12 at 21:55 +0300, Jussi Lahtinen wrote: > Yes, but it have to use different hash function, which is probably slower > (it creates longer hash codes). > > Jussi >
This is routine comes from page 436 of the dragon book. The dragon book: Aho-Sethi-Ulman : Compilers Principles, techniques, and Tools Addison-Wesley Publishing Company 1986 ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Gambas-user mailing list Gambas-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/gambas-user