⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 tie::memoize.3

📁 视频监控网络部分的协议ddns,的模块的实现代码,请大家大胆指正.
💻 3
字号:
.\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05).\".\" Standard preamble:.\" ========================================================================.de Sh \" Subsection heading.br.if t .Sp.ne 5.PP\fB\\$1\fR.PP...de Sp \" Vertical space (when we can't use .PP).if t .sp .5v.if n .sp...de Vb \" Begin verbatim text.ft CW.nf.ne \\$1...de Ve \" End verbatim text.ft R.fi...\" Set up some character translations and predefined strings.  \*(-- will.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left.\" double quote, and \*(R" will give a right double quote.  \*(C+ will.\" give a nicer C++.  Capital omega is used to do unbreakable dashes and.\" therefore won't be available.  \*(C` and \*(C' expand to `' in nroff,.\" nothing in troff, for use with C<>..tr \(*W-.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'.ie n \{\.    ds -- \(*W-.    ds PI pi.    if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch.    if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\"  diablo 12 pitch.    ds L" "".    ds R" "".    ds C` "".    ds C' ""'br\}.el\{\.    ds -- \|\(em\|.    ds PI \(*p.    ds L" ``.    ds R" '''br\}.\".\" Escape single quotes in literal strings from groff's Unicode transform..ie \n(.g .ds Aq \(aq.el       .ds Aq '.\".\" If the F register is turned on, we'll generate index entries on stderr for.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index.\" entries marked with X<> in POD.  Of course, you'll have to process the.\" output yourself in some meaningful fashion..ie \nF \{\.    de IX.    tm Index:\\$1\t\\n%\t"\\$2"...    nr % 0.    rr F.\}.el \{\.    de IX...\}.\".\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2)..\" Fear.  Run.  Save yourself.  No user-serviceable parts..    \" fudge factors for nroff and troff.if n \{\.    ds #H 0.    ds #V .8m.    ds #F .3m.    ds #[ \f1.    ds #] \fP.\}.if t \{\.    ds #H ((1u-(\\\\n(.fu%2u))*.13m).    ds #V .6m.    ds #F 0.    ds #[ \&.    ds #] \&.\}.    \" simple accents for nroff and troff.if n \{\.    ds ' \&.    ds ` \&.    ds ^ \&.    ds , \&.    ds ~ ~.    ds /.\}.if t \{\.    ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u".    ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'.    ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'.    ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'.    ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'.    ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'.\}.    \" troff and (daisy-wheel) nroff accents.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'.ds 8 \h'\*(#H'\(*b\h'-\*(#H'.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#].ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#].ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#].ds ae a\h'-(\w'a'u*4/10)'e.ds Ae A\h'-(\w'A'u*4/10)'E.    \" corrections for vroff.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'.    \" for low resolution devices (crt and lpr).if \n(.H>23 .if \n(.V>19 \\{\.    ds : e.    ds 8 ss.    ds o a.    ds d- d\h'-1'\(ga.    ds D- D\h'-1'\(hy.    ds th \o'bp'.    ds Th \o'LP'.    ds ae ae.    ds Ae AE.\}.rm #[ #] #H #V #F C.\" ========================================================================.\".IX Title "Tie::Memoize 3".TH Tie::Memoize 3 "2007-12-18" "perl v5.10.0" "Perl Programmers Reference Guide".\" For nroff, turn off justification.  Always turn off hyphenation; it makes.\" way too many mistakes in technical documents..if n .ad l.nh.SH "NAME"Tie::Memoize \- add data to hash when needed.SH "SYNOPSIS".IX Header "SYNOPSIS".Vb 5\&  require Tie::Memoize;\&  tie %hash, \*(AqTie::Memoize\*(Aq,\&      \e&fetch,                  # The rest is optional\&      $DATA, \e&exists,\&      {%ini_value}, {%ini_existence};.Ve.SH "DESCRIPTION".IX Header "DESCRIPTION"This package allows a tied hash to autoload its values on the first access,and to use the cached value on the following accesses..PPOnly read-accesses (via fetching the value or \f(CW\*(C`exists\*(C'\fR) result in calls tothe functions; the modify-accesses are performed as on a normal hash..PPThe required arguments during \f(CW\*(C`tie\*(C'\fR are the hash, the package, andthe reference to the \f(CW\*(C`FETCH\*(C'\fRing function.  The optional arguments arean arbitrary scalar \f(CW$data\fR, the reference to the \f(CW\*(C`EXISTS\*(C'\fR function,and initial values of the hash and of the existence cache..PPBoth the \f(CW\*(C`FETCH\*(C'\fRing function and the \f(CW\*(C`EXISTS\*(C'\fR functions have thesame signature: the arguments are \f(CW\*(C`$key, $data\*(C'\fR; \f(CW$data\fR is the samevalue as given as argument during \fItie()\fRing.  Both functions shouldreturn an empty list if the value does not exist.  If \f(CW\*(C`EXISTS\*(C'\fRfunction is different from the \f(CW\*(C`FETCH\*(C'\fRing function, it should returna \s-1TRUE\s0 value on success.  The \f(CW\*(C`FETCH\*(C'\fRing function should return theintended value if the key is valid..SH "Inheriting from \fBTie::Memoize\fP".IX Header "Inheriting from Tie::Memoize"The structure of the \fItied()\fR data is an array reference with elements.PP.Vb 5\&  0:  cache of known values\&  1:  cache of known existence of keys\&  2:  FETCH  function\&  3:  EXISTS function\&  4:  $data.Ve.PPThe rest is for internal usage of this package.  In particular, if\&\s-1TIEHASH\s0 is overwritten, it should call \s-1SUPER::TIEHASH\s0..SH "EXAMPLE".IX Header "EXAMPLE".Vb 6\&  sub slurp {\&    my ($key, $dir) = shift;\&    open my $h, \*(Aq<\*(Aq, "$dir/$key" or return;\&    local $/; <$h>                      # slurp it all\&  }\&  sub exists { my ($key, $dir) = shift; return \-f "$dir/$key" }\&\&  tie %hash, \*(AqTie::Memoize\*(Aq, \e&slurp, $directory, \e&exists,\&      { fake_file1 => $content1, fake_file2 => $content2 },\&      { pretend_does_not_exists => 0, known_to_exist => 1 };.Ve.PPThis example treats the slightly modified contents of \f(CW$directory\fR as ahash.  The modifications are that the keys \fIfake_file1\fR and\&\fIfake_file2\fR fetch values \f(CW$content1\fR and \f(CW$content2\fR, and\&\fIpretend_does_not_exists\fR will never be accessed.  Additionally, theexistence of \fIknown_to_exist\fR is never checked (so if it does notexists when its content is needed, the user of \f(CW%hash\fR may be confused)..SH "BUGS".IX Header "BUGS"\&\s-1FIRSTKEY\s0 and \s-1NEXTKEY\s0 methods go through the keys which were already read,not all the possible keys of the hash..SH "AUTHOR".IX Header "AUTHOR"Ilya Zakharevich <mailto:perl\-module\-hash\-memoize@ilyaz.org>.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -