Small. Fast. Reliable.
Choose any three.

Search results 91..100 of 100 for: case statement

8.7. Boundary value error in the secondary journals used by nested transactions  ... The fuzzer found a failure in an assert() statement that is used to help verify the internal state of the secondary journal. The bug was a sufficiently obscure corner-case that it might have gone unnoticed for many years, had ... 
 ... In that case, the array element selected is the N-th element of the array, starting with zero on the left. The arrayindex can also be of the form "#-N" in which case the element selected is the N-th ... 
The SQLite Amalgamation
(amalgamation.html)
 ... Though the various extensions are included in the "sqlite3.c" amalgamation file, they are disabled using #ifdef statements. Activate the extensions using compile-time options like: -DSQLITE_ENABLE_FTS3 -DSQLITE_ENABLE_FTS5 -DSQLITE_ENABLE_RTREE -DSQLITE_ENABLE_DBSTAT_VTAB -DSQLITE_ENABLE_RBU -DSQLITE_ENABLE_SESSION The amalgamation contains everything you need to integrate ... 
 ... The byte code generated by the top three layers is a prepared statement. The Virtual Machine module is responsible for running the SQL statement byte code. The B-Tree module organizes a database file into multiple key/value stores with ... 
2.1. Substitution Types  ... Lower-case hexadecimal is used for %x and upper-case is used for %X o The argument is an integer which is displayed in octal. s, z The argument is either a zero-terminated string that is displayed, or a ... 
Atomic Commit In SQLite
(atomiccommit.html)
3.2. Acquiring A Read Lock  ... Even if it is just appending new data, SQLite still has to read in the database schema from the "sqlite_schema" table so that it can know how to parse the INSERT statements and discover where in the database file the ... 
 ... UPDATE And DELETE Statements The UPDATE and DELETE statements are coded using a template that is very similar to the SELECT statement template. The main difference, of course, is that the end action is to modify the database rather than ... 
 ... In that case, the application must register at least one VFS prior to calling sqlite3_open(). This is the approach that embedded applications should use. Rather than modifying the SQLite source to insert an alternative OS layer as was done in ... 
SQLite Version 3 Overview
(version3.html)
 ... Integer values such as the length of key and data are stored using a variable-length encoding so that only one or two bytes are required to store the most common cases but up to 64-bits of information can ... 
SQLite Consortium Agreement
(consortium_agreement-20071201.html)
 ... for public release, make the SQLite source code and documentation publicly available as downloadable files and make a public statement ceding all intellectual property rights, including but not limited to copyright and patent rights, in the SQLite source code and ... 

12345678910

Page generated by FTS5 in about 170.38 ms.