Dual Key Hash Map : Hash Code « Development Class « Java

Home
Java
1.2D Graphics GUI
2.3D
3.Advanced Graphics
4.Ant
5.Apache Common
6.Chart
7.Class
8.Collections Data Structure
9.Data Type
10.Database SQL JDBC
11.Design Pattern
12.Development Class
13.EJB3
14.Email
15.Event
16.File Input Output
17.Game
18.Generics
19.GWT
20.Hibernate
21.I18N
22.J2EE
23.J2ME
24.JDK 6
25.JNDI LDAP
26.JPA
27.JSP
28.JSTL
29.Language Basics
30.Network Protocol
31.PDF RTF
32.Reflection
33.Regular Expressions
34.Scripting
35.Security
36.Servlets
37.Spring
38.Swing Components
39.Swing JFC
40.SWT JFace Eclipse
41.Threads
42.Tiny Application
43.Velocity
44.Web Services SOA
45.XML
Java » Development Class » Hash CodeScreenshots 
Dual Key Hash Map
      
/*
 * @(#)DualKeyHashMap.java  1.0 May 5, 2008
 *
 *  The MIT License
 *
 *  Copyright (c) 2008 Malachi de AElfweald <[email protected]>
 *
 *  Permission is hereby granted, free of charge, to any person obtaining a copy
 *  of this software and associated documentation files (the "Software"), to deal
 *  in the Software without restriction, including without limitation the rights
 *  to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 *  copies of the Software, and to permit persons to whom the Software is
 *  furnished to do so, subject to the following conditions:
 *
 *  The above copyright notice and this permission notice shall be included in
 *  all copies or substantial portions of the Software.
 *
 *  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 *  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 *  FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 *  AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 *  LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 *  OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 *  THE SOFTWARE.
 */
//package org.eoti.util;

import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;

public class DualKeyHashMap<XKEY, YKEY, VALUE> extends
    HashMap<DualKeyMap.DualKey<XKEY, YKEY>, VALUE> implements
    DualKeyMap<XKEY, YKEY, VALUE> {
  static class SimpleDualKey<XKEY, YKEY> implements DualKey<XKEY, YKEY> {
    protected XKEY xKey;
    protected YKEY yKey;

    public SimpleDualKey(XKEY xKey, YKEY yKey) {
      this.xKey = xKey;
      this.yKey = yKey;
    }

    public XKEY getXKey() {
      return xKey;
    }

    public YKEY getYKey() {
      return yKey;
    }

    public int hashCode() {
      return toString().hashCode();
    }

    public boolean equals(Object obj) {
      return hashCode() == obj.hashCode();
    }

    public String toString() {
      return String.format("[%s [xkey=%s][ykey=%s]"this.getClass()
          .getName(), xKey.toString(), yKey.toString());
    }
  }

  public DualKeyHashMap(int initialCapacity, float loadFactor) {
    super(initialCapacity, loadFactor);
  }

  public DualKeyHashMap(int initialCapacity) {
    super(initialCapacity);
  }

  public DualKeyHashMap() {
    super();
  }

  public DualKeyHashMap(Map<? extends DualKey<XKEY, YKEY>, ? extends VALUE> m) {
    super(m);
  }

  public boolean containsXKey(XKEY xKey) {
    for (DualKey<XKEY, YKEY> key : keySet()) {
      if (key.getXKey().equals(xKey))
        return true;
    }
    return false;
  }

  public boolean containsYKey(YKEY yKey) {
    for (DualKey<XKEY, YKEY> key : keySet()) {
      if (key.getYKey().equals(yKey))
        return true;
    }
    return false;
  }

  public VALUE get(XKEY xKey, YKEY yKey) {
    return super.get(new SimpleDualKey<XKEY, YKEY>(xKey, yKey));
  }

  public Set<XKEY> getXKeySet() {
    HashSet<XKEY> xKeys = new HashSet<XKEY>();
    for (DualKey<XKEY, YKEY> key : keySet())
      xKeys.add(key.getXKey());

    return xKeys;
  }

  public Set<YKEY> getYKeySet() {
    HashSet<YKEY> yKeys = new HashSet<YKEY>();
    for (DualKey<XKEY, YKEY> key : keySet())
      yKeys.add(key.getYKey());

    return yKeys;
  }

  public VALUE put(XKEY xKey, YKEY yKey, VALUE value) {
    return put(new SimpleDualKey<XKEY, YKEY>(xKey, yKey), value);
  }

  public void putAll(DualKeyMap<XKEY, YKEY, VALUE> map) {
    super.putAll(map);
  }

  public VALUE remove(XKEY xKey, YKEY yKey) {
    return remove(new SimpleDualKey<XKEY, YKEY>(xKey, yKey));
  }

}

interface DualKeyMap<XKEY, YKEY, VALUE> extends
    Map<DualKeyMap.DualKey<XKEY, YKEY>, VALUE> {
  static interface DualKey<XKEY, YKEY> {
    public XKEY getXKey();

    public YKEY getYKey();

    public int hashCode();

    public boolean equals(Object obj);
  }

  // static interface Entry<XKEY,YKEY,VALUE> extends Map.Entry<Key<XKEY,YKEY>,
  // VALUE>
  // public void clear();
  public boolean containsXKey(XKEY xKey);

  public boolean containsYKey(YKEY yKey);

  // public Set<Entry<XKEY,YKEY,VALUE>> entrySet();
  // public boolean equals(Object obj);
  public VALUE get(XKEY xKey, YKEY yKey);

  // public int hashCode();
  // public boolean isEmpty();
  public Set<XKEY> getXKeySet();

  public Set<YKEY> getYKeySet();

  public VALUE put(XKEY xKey, YKEY yKey, VALUE value);

  public void putAll(DualKeyMap<XKEY, YKEY, VALUE> map);

  public VALUE remove(XKEY xKey, YKEY yKey);
  // public int size();
  // public Collection<VALUE> values();
}

   
    
    
    
    
    
  
Related examples in the same category
1.Computing hash codes
2.A hash-code generator and a collection of static hash-code generation methods.
3.MD5 hash generator
4.Hash 32 String
5.Hash 64 String
6.MD5 hashing: Encodes a string
7.MD5 String
8.Hash Code BuilderHash Code Builder
9.HashCode generationHashCode generation
10.Get hash code for primitive data types
11.Return as hash code for the given object
12.Null Safe Hash Code
13.A very efficient java hash algorithm, based on the BuzHash algoritm
14.Easy implementation of hashCode
15.An implementation of the HMACT64 keyed hashing algorithm
16.Gets the hash code of an object returning zero when the object is null
17.Unify Hash
18.Secure Hash
19.FNV Hash
20.Jenkins Hash
21.Concurrent Cuckoo hashing using lock striping. Uses R/W locks for resizing. Exercise solution.
22.Concurrent Cuckoo hashing using lock striping.
23.encode Hex
24.Fowler/Noll/Vo hash algorhythm
25.Produces 32-bit hash for hash table lookup. (Jenkins Hash Function)
26.Key Value Hash
27.Paul Hsieh's Hash Function.
28.An extension of WeakReference that implements a sane equals and hashcode method.
29.A hash map with int key and int values.
30.null Safe Equals and Hash
31.Generates a hash code for a given source code.
32.AtkinsonHash utility class implements the hash algorithm used by HyperCard's ask password command.
33.Hash Code AssistHash Code Assist
34.This is a very fast, non-cryptographic hash suitable for general hash-based lookup.
35.An advanced hash table supporting configurable garbage collection semantics of keys and values
36.Hash string
java2s.com  | Contact Us | Privacy Policy
Copyright 2009 - 12 Demo Source and Support. All rights reserved.
All other trademarks are property of their respective owners.