Take a look at the comments and code in update.sh
.
Requires a working version of Java 1.8.
I use create_tarball.sh
to make a copy of the build to share.
OpenJDK 1.7 builds for Mac OS X:
// PS: Datasets: | |
// http://dl.dropbox.com/u/3545192/cep.zip | |
// http://dl.dropbox.com/u/3545192/consultas.txt | |
/* SCE-183 - Algoritmos e estruturas de dados II | |
* Professora: Prof.a Dr.a Hosiane M. Bueno | |
* | |
* Trabalho 2: ¡rvore-B | |
* | |
* Autor: VinÌcius Baggio Fuentes |
import java.io.IOException; | |
import java.net.InetAddress; | |
import java.net.InetSocketAddress; | |
import java.net.Socket; | |
import java.nio.channels.SocketChannel; | |
public class LeakTest { | |
public static void main(String[] args) { | |
new LeakTest().test(); |
package com.headius.indy.examples; | |
import java.lang.invoke.MethodHandle; | |
import static java.lang.invoke.MethodHandles.*; | |
import static java.lang.invoke.MethodType.*; | |
import java.lang.invoke.MutableCallSite; | |
public class IndyLoop { | |
public static void main(String[] args) throws Throwable { | |
// method handle loop adds up numbers from 1 to args[0].to_i |
# Java's JCE requires extra JVM config download named Jurisdiction Policy Files where AES keysize > 128bit. | |
# You can do encrypt/decrypt using BouncyCastle via JRuby's Java integration like this. | |
# Use this at your own risk. | |
require 'java' | |
require 'openssl' | |
java_import 'org.bouncycastle.crypto.BlockCipher' | |
java_import 'org.bouncycastle.crypto.engines.AESLightEngine' | |
java_import 'org.bouncycastle.crypto.modes.CBCBlockCipher' |
require 'rubygems' | |
require 'mechanize' | |
require 'httparty' | |
# Ugly code, for an ugly hack. | |
# Hey, if Lighthouse didn't suck then none of this would happen. | |
# It's been lotsa fun coding it though, so I suppose I should be thankful for the "opportunity" |