On Wed, 2011-10-12 at 21:55 +0300, Jussi Lahtinen wrote:
> Yes, but it have to use different hash function, which is probably slower
> (it creates longer hash codes).
> 
> Jussi
> 

This is routine comes from page 436 of the dragon book.

The dragon book:
Aho-Sethi-Ulman : Compilers Principles, techniques, and Tools
Addison-Wesley Publishing Company 1986



------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Gambas-user mailing list
Gambas-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gambas-user

Reply via email to