<context-param>
<param-name>com.sun.faces.numberOfViewsInSession</param-name>
<param-value>15</param-value>
</context-param>
<context-param>
<param-name>com.sun.faces.numberOfLogicalViews</param-name>
<param-value>15</param-value>
</context-param>
(com.sun.faces.config.WebConfiguration)
By default, a total of 15 top-level views are allowed to exist in a session. Likewise, a total of 15 logical views are also allowed in session. Logical views are subviews of a top-level view. For example, if you have a page that includes multiple frames then each frame is a logical view.
If you have a simple application then the default of 15 views or 15 logical views might be too large. In this case, you should consider reducing the allowable number of views and logical views to conserve memory. Conversely, a more complex application might require more than 15 views or logical views to be saved in a session.
相关推荐
The static chamber approach is often used for ...KAPPA.MAX method effectively improved the decision between linear and nonlinear flux estimatesreducing the bias at a minimal cost of uncertainty.
those macroblocks badly affected by restricting the region of the chosen motion vectors in inter mode. The watermark can be easily retrieved by the encoding mode of the macroblocks or the region of ...
6.2.4 Use of a Local Virtual SMSC GT in the SIM Card 111 6.3 Detailed Implementation of the Virtual SMSC 112 6.3.1 Half-SCCP Roaming for SMS-MO 112 6.3.2 Failure of Half-SCCP Roaming for SMS-MO 113 ...
contains the channel impulse responses for a pre-defined number of radio links. Mapping of MS-BS distances, array orientations and MS mobility parameters into the SCM input format is left to the ...
POLYCOM grants you a limited, non-exclusive, non-transferable license to install and use, on a DEVICE, the number and type of SOFTWARE PRODUCT licenses listed in your AUTHORIZED PURCHASE ORDER solely...
and insufficiencies in the construction of big data information platforms restricting the development of intelligent transportation. These points are crucial for improving Zhengdong New Area's ...
on a single computer with a single set of input devices, restricting the use of such computer to one concurrent Developer. Conversely, you may not install or use the SOFTWARE on a computer that is a ...
on a single computer with a single set of input devices, restricting the use of such computer to one concurrent Developer. Conversely, you may not install or use the SOFTWARE on a computer that is a ...
A landmark in this history was the invention of OpenGL, one of the first graphics libraries, which allowed us to create real-time, high-performance 3D graphics, and which was available for everyone ...
andX-Trace[12],butcertaindesign choices were made that have been key to its success in our environment, such as the use of sampling and restricting the instrumentation to a rather small number of ...
Calculating the Number of Weekdays Between Two Dates Recipe 3.6. Looking up Holidays Automatically Recipe 3.7. Fuzzy Parsing of Dates Recipe 3.8. Checking Whether Daylight Saving Time Is ...
Praise for the Third Edition of Spring in Action Preface Acknowledgments About this Book 1. Core Spring Chapter 1. Springing into action 1.1. Simplifying Java development 1.1.1. Unleashing the power ...
This paper is a survey of the theory and methods of photogrammetric bundle adjustment, aimed at potential implementors in the computer vision community. Bundle adjustment is the problem of refining a ...
Restricting access to logged-in users 80 Methods for browsing bookmarks 81 Improving the user page 83 Creating a tag page 85 Building a tag cloud 87 A word on security 90 SQL injection 91 Cross...
The State of the Module Address Contracts and Obligations Caveat Creator Where Should I Put this Control? Testing your Controls Summary Chapter 17: ActiveX Control Containers Taking Credit ...
**Description:** This feature allows database administrators (DBAs) to query the history of data changes within a table, providing the ability to see past versions of rows or even entire tables....
Forprogrammers migrating from BP7 a TCollection replacement is alsoprovided.My objective in writing these units was to provide myself with a setof well-encapsulated classes that would manage the ...
important step in breaking out of the “build-break-tweak” cycle that Poe’s quote described has been the idea that we can have a mathematically precise definition of security, rather than relying on...