Hello,
I have seen people doing erase remove idiom like the following:
' vec.erase(remov e_if(vec.begin( ), vec.end(), is_odd<int>),
vec.end() );'
I remember Scott Meyers also uses this form in his 'Effective
STL' book. ( I cannot verify it right now because the book is not with
me )
But I was wondering if this form is safe, in the strictest sense.
The underlying question is ' does remove guarantee that the end()
iterator is still valid after the operation' ? If it is not guaranteed
and if the second parameter 'vec.end()' is evaluated first (before
remove), then vec.erase will possibly get a new end as the first
parameter, but an old/invalid end() iterator as the second.
I hope I explained my question clearly.
Thanks,
Nan 2 3689
Nan Li wrote: Hello, I have seen people doing erase remove idiom like the following:
' vec.erase(remov e_if(vec.begin( ), vec.end(), is_odd<int>), vec.end() );'
I remember Scott Meyers also uses this form in his 'Effective STL' book. ( I cannot verify it right now because the book is not with me ) But I was wondering if this form is safe, in the strictest sense. The underlying question is ' does remove guarantee that the end() iterator is still valid after the operation' ? If it is not guaranteed and if the second parameter 'vec.end()' is evaluated first (before remove), then vec.erase will possibly get a new end as the first parameter, but an old/invalid end() iterator as the second. I hope I explained my question clearly.
There is no guarantee on the order of execution, but none is required.
The moving around of items in the sequence can't do anything that
would invalidate the end() iterator since it's not evaluated at all
during the execution of remove (it's passed in as an argument).
This is one of the reasons hy remove doesn't actually remove anything.
"Ron Natalie" <ro*@spamcop.ne t> wrote in message
news:43******** **************@ news.newshostin g.com... Nan Li wrote:
But I was wondering if this form is safe, in the strictest sense. The underlying question is ' does remove guarantee that the end() iterator is still valid after the operation' ?
There is no guarantee on the order of execution, but none is required. The moving around of items in the sequence can't do anything that would invalidate the end() iterator since it's not evaluated at all during the execution of remove (it's passed in as an argument).
This is a good one to remember the next time you're looking for an interview
question :-) This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Harald Grossauer |
last post by:
Usually STL containers have something like "iterator
container<>::erase(iterator)" which erases the element the iterator points
to and returns another valid iterator. Set does not have this, set::erase()
returns void and "invalidates" the iterator.
Now I have the following code:
while(!some_set.empty()) {
for(it = some_set.begin(); it != some_set.end(); it++)
{
|
by: Generic Usenet Account |
last post by:
To settle the dispute regarding what happens when an "erase" method is
invoked on an STL container (i.e. whether the element is merely
removed from the container or whether it also gets deleted in the
process), I looked up the STL code. Erase certainly does not delete
the memory associated with the element. However, it appears that the
destructor on the element is invoked. I wonder why it has to be this
way. In my opinion, this renders...
|
by: Michael |
last post by:
Guys,
I'm trying to compile this code to build a huffman tree, but I'm getting a
runtime error and my degugger ends up somewhere in the STL files. What am i
doing wrong. I appreciate its not effiecient/stylistic, etc, it was just
something i wanted to try
Thanks
Mike
|
by: vikas |
last post by:
how can I make getline(cin, somestring) make skip initial white spaces,
say if i enter " a" length should be 1.
why do i need to hit enter twice after getline to display what i got?
how to over come that?
example:
int main(int argc, char* argv)
{
string s;
|
by: jpalecek |
last post by:
Hello,
I know there is a method "insert with hint" int std::set. But there
isn't anything similar for find and erase.
Does somebody know why?
Regards
Jiri Palecek
| |
by: olanglois |
last post by:
Hi,
I was asking myself to following question. What is better to erase an
element from a STL map:
calling (option #1)
size_type erase(const key_type& k)
or calling (option #2)
|
by: RishiD |
last post by:
Hi,
I am using an iterator on a list, I wanted to know is there a simple
way to erase() the current element the iterator is pointing to and move
the iterator forward one?
The only way I can think of doing this is making a temp iterator equal
to orig position, then erasing, and setting the original iterator to
temp iterator++
|
by: chsalvia |
last post by:
I have a question about the design of STL vector. One thing I wonder
was why the STL designers chose to have the insert() and erase()
functions take an iterator as the first argument, rather than simply
an array index integer referring to a position in the array.
The reason I wonder this is because firstly, the implementation will
need to convert the iterator to an array index integer anyway, because
the iterator may become invalidated...
|
by: subramanian100in |
last post by:
Suppose I have
vector<intcontainer;
Suppose I store some values into "container".
Suppose that "left" and "right" are valid iterators into "container"
and that "right" is NOT container.end() and "right" comes after
"left".
|
by: subramanian100in |
last post by:
Suppose I have
vector<intc;
for (int i = 0; i < 10; ++i)
c.push_back(i);
vector<int>::iterator it = find(c.begin(), c.end(), 5);
If I do,
c.insert(c.begin(), 10);
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
| |
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
| |
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |