Bisht:
You
> will I still be able to see all entries including newly inserted ones and not
>see the deleted ones
The only caution is what you call "value" pointer. It is only valid until the
next Delete, Insert
or Free (the Judy array modification routines). JLF, JLL JLN etc. examine the
array as it is
at the instant they are called -- I.E. they start from scratch.
Thanks for your interest,
doug
Doug Baskins <[email protected]>
>________________________________
> From: "Bisht, Pradeep" <[email protected]>
>To: "[email protected]" <[email protected]>
>Cc: Doug Baskins <[email protected]>
>Sent: Thursday, July 26, 2012 3:38 PM
>Subject: insertion/deletion during sorted order scan;
>
>
>Is it okay to do something like this in Judy arrays:
>
>
> JLL (value, JArray, index);
>
> if (value != NULL) {
> // insert/delete some entries <<< OKAY ?
> }
>
> // find the next overlapping
> index = (Word_t)someNewValue
> JLF (value, JArray, index);
> while (value != NULL) {
> // insert/delete some entries <<<< OKAY ?
>
>
> // continue searching for post overlapping range
>
> JLN (value, JArray, index);
> } // while (value != NULL)
>
>
>will I still be able to see all entries including newly inserted ones and not
>see the deleted ones?
>OR
>will I see only the old ones ?
>OR
>will I see unknown results ?
>------------------------------------------------------------------------------
>Live Security Virtual Conference
>Exclusive live event will cover all the ways today's security and
>threat landscape has changed and how IT managers can respond. Discussions
>will include endpoint security, mobile security and the latest in malware
>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>_______________________________________________
>Judy-devel mailing list
>[email protected]
>https://lists.sourceforge.net/lists/listinfo/judy-devel
>
>
>------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Judy-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/judy-devel