Bisht:

You 
> will I still be able to see all entries including newly inserted ones and not 
>see the deleted ones

The only caution is what you call "value" pointer.  It is only valid until the 
next Delete, Insert 
or Free (the  Judy array modification routines).  JLF, JLL JLN etc. examine the 
array as it is
at the instant they are called -- I.E. they start from scratch.

Thanks for your interest,

doug

Doug Baskins <[email protected]>



>________________________________
> From: "Bisht, Pradeep" <[email protected]>
>To: "[email protected]" <[email protected]> 
>Cc: Doug Baskins <[email protected]> 
>Sent: Thursday, July 26, 2012 3:38 PM
>Subject: insertion/deletion during sorted order scan;
> 
>
>Is it okay to do something like this in Judy arrays:
>
>
>            JLL (value, JArray, index);
>
>            if (value != NULL) {
>               // insert/delete some entries <<< OKAY ?
>            }
>
>            // find the next overlapping
>            index = (Word_t)someNewValue
>            JLF (value, JArray, index);
>            while (value != NULL) {
>                // insert/delete some entries <<<< OKAY ?
>
>
>                // continue searching for post overlapping range
>
>                JLN (value, JArray, index);
>            } // while (value != NULL)
>
>
>will I still be able to see all entries including newly inserted ones and not 
>see the deleted ones?
>OR
>will I see only the old ones ?
>OR
>will I see unknown results ?
>------------------------------------------------------------------------------
>Live Security Virtual Conference
>Exclusive live event will cover all the ways today's security and 
>threat landscape has changed and how IT managers can respond. Discussions 
>will include endpoint security, mobile security and the latest in malware 
>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>_______________________________________________
>Judy-devel mailing list
>[email protected]
>https://lists.sourceforge.net/lists/listinfo/judy-devel
>
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Judy-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/judy-devel

Reply via email to