Table of contentsWeak References Weak Pointer Weak Hash-Table Strong Feature Caveats Weak Datastructures Primitive Datastructures Levels of Support Implementations of Level 1 Implementations of Level 2 Implementations of Level 3 Implementations of Level 4 Implementation - GC GC with Weak Phase First Try Second Try Third Try Third Try (2) |
Author: Bruno Haible E-mail: bruno@clisp.org Homepage: http://www.clisp.org/ |