They provide a notification mechanism relying on proxy objects, which establish a weak reference to their targets that do not prevent their garbage collection. ... Weak references even come in three flavors: soft, weak and phantom, which support caching as well as ... to the other flavors of weak references, the Java API particularity requires the unretrievable target of a phantom reference to be clearedanbsp;...
|Title||:||Architecture of Computing Systems - ARCS 2010|
|Author||:||Christian Müller-Schloer, Wolfgang Karl, Sami Yehia|
|Publisher||:||Springer - 2010-04-07|