This is an automated email from the ASF dual-hosted git repository. ggregory pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/commons-collections.git
The following commit(s) were added to refs/heads/master by this push: new 83694e78b Javadoc 83694e78b is described below commit 83694e78b5ae825601bd17da1da4e151de6d73a3 Author: Gary Gregory <garydgreg...@gmail.com> AuthorDate: Sun Jun 23 11:37:01 2024 -0400 Javadoc - Don't use camel-case unless the name is a type of method - Use @link --- .../collections4/bloomfilter/package-info.java | 46 +++++++++++----------- 1 file changed, 23 insertions(+), 23 deletions(-) diff --git a/src/main/java/org/apache/commons/collections4/bloomfilter/package-info.java b/src/main/java/org/apache/commons/collections4/bloomfilter/package-info.java index 84bad2c06..1ceb81647 100644 --- a/src/main/java/org/apache/commons/collections4/bloomfilter/package-info.java +++ b/src/main/java/org/apache/commons/collections4/bloomfilter/package-info.java @@ -26,13 +26,13 @@ * into another filter {@code A} by verifying that {@code (A & B) == B}.</p> * * <p>Bloom filters are generally used where hash tables would be too large, or as a filter front end for longer processes. - * For example most browsers have a Bloom filter that is built from all known bad URLs (ones that serve up malware). + * For example most browsers have a Bloom filter that is built from all known bad URLs (ones that serve up malicious software). * When you enter a URL the browser builds a Bloom filter and checks to see if it is "in" the bad URL filter. If not the * URL is good, if it matches, then the expensive lookup on a remote system is made to see if it actually is in the * list. There are lots of other uses, and in most cases the reason is to perform a fast check as a gateway for a longer * operation.</p> * - * <p>Some Bloom filters (e.g. CountingBloomFilter) use counters rather than bits. In this case each counter + * <p>Some Bloom filters (e.g. {@link CountingBloomFilter}) use counters rather than bits. In this case each counter * is called a {@code cell}.</p> * * <h3>BloomFilter</h3> @@ -44,38 +44,38 @@ * <h4>Nomenclature</h4> * * <ul> - * <li>BitMap - In the bloomfilter package a BitMap is not a structure but a logical construct. It is conceptualized + * <li>BitMap - In the {@code bloomfilter} package a BitMap is not a structure but a logical construct. It is conceptualized * as an ordered collection of {@code long} values each of which is interpreted as the enabled true/false state of 64 continuous indices. The mapping of - * bits into the {@code long} values is described in the {@code BitMaps} javadoc.</li> + * bits into the {@code long} values is described in the {@link BitMaps} Javadoc.</li> * - * <li>Index - In the bloomfilter package an Index is a logical collection of {@code int}s specifying the enabled - * bits in the BitMap.</li> + * <li>Index - In the {@code bloomfilter} package an Index is a logical collection of {@code int}s specifying the enabled + * bits in the bit map.</li> * - * <li>Cell - Some Bloom filters (e.g. CountingBloomFilter) use counters rather than bits. In the bloomfilter package + * <li>Cell - Some Bloom filters (e.g. {@link CountingBloomFilter}) use counters rather than bits. In the {@code bloomfilter} package * Cells are pairs of ints representing an index and a value. They are not {@code Pair} objects. </li> * - * <li>Extractor - The Extractors are {@code FunctionalInterfaces} that are conceptually iterators on a {@code BitMap}, an {@code Index}, or a + * <li>Extractor - The Extractors are {@code FunctionalInterfaces} that are conceptually iterators on a bit map, an {@code Index}, or a * collection of {@code Cell}s, with an early termination switch. Extractors have - * names like {@code BitMapExtractor} or {@code IndexExtractor} and have a {@code processXs} methods that take a + * names like {@link BitMapExtractor} or {@code IndexExtractor} and have a {@code processXs} methods that take a * {@code Predicate<X>} argument (e.g. {@code processBitMaps(LongPredicate)} or {@code processIndicies(IntPredicate)}). * That predicate is expected to process each of the Xs in turn and return {@code true} if the processing should continue * or {@code false} to stop it. </li> * </ul> * - * <p>There is an obvious association between the BitMap and the Index, as defined above, in that if bit 5 is enabled in the - * BitMap than the Index must contain the value 5.</p> + * <p>There is an obvious association between the bit map and the Index, as defined above, in that if bit 5 is enabled in the + * bit map than the Index must contain the value 5.</p> * * * <h4>Implementation Notes</h4> * * <p>The architecture is designed so that the implementation of the storage of bits is abstracted. Rather than specifying a - * specific state representation we require that all Bloom filters implement the BitMapExtractor and IndexExtractor interfaces, - * Counting-based Bloom filters implement {@code CellExtractor} as well. There are static + * specific state representation we require that all Bloom filters implement the {@link BitMapExtractor} and {@link IndexExtractor} interfaces, + * Counting-based Bloom filters implement {@link CellExtractor} as well. There are static * methods in the various Extractor interfaces to convert from one type to another.</p> * - * <p>Programs that utilize the Bloom filters may use the {@code BitMapExtractor} or {@code IndexExtractor} to retrieve + * <p>Programs that utilize the Bloom filters may use the {@link BitMapExtractor} or {@link IndexExtractor} to retrieve * or process a representation of the internal structure. - * Additional methods are available in the {@code BitMaps} class to assist in manipulation of BitMap representations.</p> + * Additional methods are available in the {@link BitMaps} class to assist in manipulation of bit map representations.</p> * * <p>The Bloom filter is an interface that requires implementation of 9 methods:</p> * <ul> @@ -103,30 +103,30 @@ * * <h3>CountingBloomFilter</h3> * - * <p>The counting Bloom filter extends the Bloom filter by counting the number of times a specific bit has been + * <p>The {@link CountingBloomFilter} extends the Bloom filter by counting the number of times a specific bit has been * enabled or disabled. This allows the removal (opposite of merge) of Bloom filters at the expense of additional * overhead.</p> * * <h3>LayeredBloomFilter</h3> * - * <p>The layered Bloom filter extends the Bloom filter by creating layers of Bloom filters that can be queried as a single + * <p>The {@link LayeredBloomFilter} extends the Bloom filter by creating layers of Bloom filters that can be queried as a single * Filter or as a set of filters. This adds the ability to perform windowing on streams of data.</p> * * <h3>Shape</h3> * - * <p>The Shape describes the Bloom filter using the number of bits and the number of hash functions. It can be specified + * <p>The {@link Shape} describes the Bloom filter using the number of bits and the number of hash functions. It can be specified * by the number of expected items and desired false positive rate.</p> * * <h3>Hasher</h3> * - * <p>A Hasher converts bytes into a series of integers based on a Shape. Each hasher represents one item being added + * <p>A {@link Hasher} converts bytes into a series of integers based on a Shape. Each hasher represents one item being added * to the Bloom filter.</p> * - * <p>The EnhancedDoubleHasher uses a combinatorial generation technique to create the integers. It is easily - * initialized by using a byte array returned by the standard {@code MessageDigest} or other hash function to - * initialize the Hasher. Alternatively a pair of a long values may also be used.</p> + * <p>The {@link EnhancedDoubleHasher} uses a combinatorial generation technique to create the integers. It is easily + * initialized by using a byte array returned by the standard {@link java.security.MessageDigest} or other hash function to + * initialize the Hasher. Alternatively, a pair of a long values may also be used.</p> * - * <p>Other implementations of the Hasher are easy to implement, and should make use of the {@code Hasher.Filter} + * <p>Other implementations of the {@link Hasher} are easy to implement, and should make use of the {@code Hasher.Filter} * and/or {@code Hasher.FileredIntConsumer} classes to filter out duplicate indices when implementing * {@code Hasher.uniqueIndices(Shape)}.</p> *