Push, which adds an element to the collection, and
Pop, which removes the most recently added element.
Additionally, a peek operation can, without modifying the stack, return the value of the last element added. The name stack is an analogy to a set of physical items stacked one atop another, such as a stack of plates.
The order in which an element added to or removed from a stack is described as last in, first out, referred to by the acronym LIFO.[nb 1] As with a stack of physical objects, this structure makes it easy to take an item off the top of the stack, but accessing a datum deeper in the stack may require removing multiple other items first.[1]
Considered a sequential collection, a stack has one end which is the only position at which the push and pop operations may occur, the top of the stack, and is fixed at the other end, the bottom. A stack may be implemented as, for example, a singly linked list with a pointer to the top element.
A stack may be implemented to have a bounded capacity. If the stack is full and does not contain enough space to accept another element, the stack is in a state of stack overflow.
Stacks entered the computer science literature in 1946, when Alan Turing used the terms "bury" and "unbury" as a means of calling and returning from subroutines.[2][3]Subroutines and a two-level stack had already been implemented in Konrad Zuse's Z4 in 1945.[4][5]
Stacks are often described using the analogy of a spring-loaded stack of plates in a cafeteria.[16][1][17] Clean plates are placed on top of the stack, pushing down any plates already there. When the top plate is removed from the stack, the one below it is elevated to become the new top plate.
Non-essential operations
In many implementations, a stack has more operations than the essential "push" and "pop" operations. An example of a non-essential operation is "top of stack", or "peek", which observes the top element without removing it from the stack.[18] Since this can be broken down into a "pop" followed by a "push" to return the same data to the stack, it is not considered an essential operation. If the stack is empty, an underflow condition will occur upon execution of either the "stack top" or "pop" operations. Additionally, many implementations provide a check if the stack is empty and an operation that returns its size.
Software stacks
Implementation
A stack can be easily implemented either through an array or a linked list, as it is merely a special case of a list.[19] In either case, what identifies the data structure as a stack is not the implementation but the interface: the user is only allowed to pop or push items onto the array or linked list, with few other helper operations. The following will demonstrate both implementations using pseudocode.
Array
An array can be used to implement a (bounded) stack, as follows. The first element, usually at the zero offset, is the bottom, resulting in array[0] being the first element pushed onto the stack and the last element popped off. The program must keep track of the size (length) of the stack, using a variable top that records the number of items pushed so far, therefore pointing to the place in the array where the next element is to be inserted (assuming a zero-based index convention). Thus, the stack itself can be effectively implemented as a three-element structure:
structure stack:
maxsize : integer
top : integer
items : array of item
The push operation adds an element and increments the top index, after checking for overflow:
procedure push(stk : stack, x : item):
if stk.top = stk.maxsize:
report overflow error
else:
stk.items[stk.top] ← x
stk.top ← stk.top + 1
Similarly, pop decrements the top index after checking for underflow, and returns the item that was previously the top one:
procedure pop(stk : stack):
if stk.top = 0:
report underflow error
else:
stk.top ← stk.top − 1
r ← stk.items[stk.top]
return r
Using a dynamic array, it is possible to implement a stack that can grow or shrink as much as needed. The size of the stack is simply the size of the dynamic array, which is a very efficient implementation of a stack since adding items to or removing items from the end of a dynamic array requires amortized O(1) time.
Linked list
Another option for implementing stacks is to use a singly linked list. A stack is then a pointer to the "head" of the list, with perhaps a counter to keep track of the size of the list:
structure frame:
data : item
next : frame or nil
structure stack:
head : frame or nil
size : integer
Pushing and popping items happens at the head of the list; overflow is not possible in this implementation (unless memory is exhausted):
procedure push(stk : stack, x : item):
newhead ← new frame
newhead.data ← x
newhead.next ← stk.head
stk.head ← newhead
stk.size ← stk.size + 1
procedure pop(stk : stack):
if stk.head = nil:
report underflow error
r ← stk.head.data
stk.head ← stk.head.next
stk.size ← stk.size - 1
return r
Stacks and programming languages
Some languages, such as Perl, LISP, JavaScript and Python, make the stack operations push and pop available on their standard list/array types. Some languages, notably those in the Forth family (including PostScript), are designed around language-defined stacks that are directly visible to and manipulated by the programmer.
The following is an example of manipulating a stack in Common Lisp (">" is the Lisp interpreter's prompt; lines not starting with ">" are the interpreter's responses to expressions):
>(setfstack(list'a'b'c));; set the variable "stack"(ABC)>(popstack);; get top (leftmost) element, should modify the stackA>stack;; check the value of stack(BC)>(push'newstack);; push a new top onto the stack(NEWBC)
Several of the C++ Standard Library container types have push_back and pop_back operations with LIFO semantics; additionally, the stack template class adapts existing containers to provide a restricted API with only push/pop operations. PHP has an SplStack class. Java's library contains a Stack class that is a specialization of Vector. Following is an example program in Java language, using that class.
importjava.util.Stack;classStackDemo{publicstaticvoidmain(String[]args){Stack<String>stack=newStack<String>();stack.push("A");// Insert "A" in the stackstack.push("B");// Insert "B" in the stackstack.push("C");// Insert "C" in the stackstack.push("D");// Insert "D" in the stackSystem.out.println(stack.peek());// Prints the top of the stack ("D")stack.pop();// removing the top ("D")stack.pop();// removing the next top ("C")}}
A common use of stacks at the architecture level is as a means of allocating and accessing memory.
Basic architecture of a stack
A typical stack is an area of computer memory with a fixed origin and a variable size. Initially the size of the stack is zero. A stack pointer (usually in the form of a processor register) points to the most recently referenced location on the stack; when the stack has a size of zero, the stack pointer points to the origin of the stack.
The two operations applicable to all stacks are:
A push operation: the address in the stack pointer is adjusted by the size of the data item and a data item is written at the location to which the stack pointer points.
A pop or pull operation: a data item at the current location to which the stack pointer points is read, and the stack pointer is moved by a distance corresponding to the size of that data item.
There are many variations on the basic principle of stack operations. Every stack has a fixed location in memory at which it begins. As data items are added to the stack, the stack pointer is displaced to indicate the current extent of the stack, which expands away from the origin.
Stack pointers may point to the origin of a stack or to a limited range of addresses above or below the origin (depending on the direction in which the stack grows); however, the stack pointer cannot cross the origin of the stack. In other words, if the origin of the stack is at address 1000 and the stack grows downwards (towards addresses 999, 998, and so on), the stack pointer must never be incremented beyond 1000 (to 1001 or beyond). If a pop operation on the stack causes the stack pointer to move past the origin of the stack, a stack underflow occurs. If a push operation causes the stack pointer to increment or decrement beyond the maximum extent of the stack, a stack overflow occurs.
Some environments that rely heavily on stacks may provide additional operations, for example:
Duplicate: the top item is popped and then pushed twice, such that two copies of the former top item now lie at the top.
Peek: the topmost item is inspected (or returned), but the stack pointer and stack size does not change (meaning the item remains on the stack). This can also be called the top operation.
Swap or exchange: the two topmost items on the stack exchange places.
Rotate (or Roll): the n topmost items are moved on the stack in a rotating fashion. For example, if n = 3, items 1, 2, and 3 on the stack are moved to positions 2, 3, and 1 on the stack, respectively. Many variants of this operation are possible, with the most common being called left rotate and right rotate.
Stacks are often visualized growing from the bottom up (like real-world stacks). They may also be visualized growing from left to right, where the top is on the far right, or even growing from top to bottom. The important feature is for the bottom of the stack to be in a fixed position. The illustration in this section is an example of a top-to-bottom growth visualization: the top (28) is the stack "bottom", since the stack "top" (9) is where items are pushed or popped from.
A right rotate will move the first element to the third position, the second to the first and the third to the second. Here are two equivalent visualizations of this process:
apple banana
banana ===right rotate==> cucumber
cucumber apple
cucumber apple
banana ===left rotate==> cucumber
apple banana
A stack is usually represented in computers by a block of memory cells, with the "bottom" at a fixed location, and the stack pointer holding the address of the current "top" cell in the stack. The "top" and "bottom" nomenclature is used irrespective of whether the stack actually grows towards higher memory addresses.
Pushing an item on to the stack adjusts the stack pointer by the size of the item (either decrementing or incrementing, depending on the direction in which the stack grows in memory), pointing it to the next cell, and copies the new top item to the stack area. Depending again on the exact implementation, at the end of a push operation, the stack pointer may point to the next unused location in the stack, or it may point to the topmost item in the stack. If the stack points to the current topmost item, the stack pointer will be updated before a new item is pushed onto the stack; if it points to the next available location in the stack, it will be updated after the new item is pushed onto the stack.
Popping the stack is simply the inverse of pushing. The topmost item in the stack is removed and the stack pointer is updated, in the opposite order of that used in the push operation.
Stack in main memory
Many CISC-type CPU designs, including the x86, Z80 and 6502, have a dedicated register for use as the call stack stack pointer with dedicated call, return, push, and pop instructions that implicitly update the dedicated register, thus increasing code density. Some CISC processors, like the PDP-11 and the 68000, also have special addressing modes for implementation of stacks, typically with a semi-dedicated stack pointer as well (such as A7 in the 68000). In contrast, most RISC CPU designs do not have dedicated stack instructions and therefore most, if not all, registers may be used as stack pointers as needed.
Some machines use a stack for arithmetic and logical operations; operands are pushed onto the stack, and arithmetic and logical operations act on the top one or more items on the stack, popping them off the stack and pushing the result onto the stack. Machines that function in this fashion are called stack machines.
The x87floating point architecture is an example of a set of registers organised as a stack where direct access to individual registers (relative to the current top) is also possible.
Having the top-of-stack as an implicit argument allows for a small machine code footprint with a good usage of busbandwidth and code caches, but it also prevents some types of optimizations possible on processors permitting random access to the register file for all (two or three) operands. A stack structure also makes superscalar implementations with register renaming (for speculative execution) somewhat more complex to implement, although it is still feasible, as exemplified by modern x87 implementations.
Sun SPARC, AMD Am29000, and Intel i960 are all examples of architectures that use register windows within a register-stack as another strategy to avoid the use of slow main memory for function arguments and return values.
There is also a number of small microprocessors that implement a stack directly in hardware, and some microcontrollers have a fixed-depth stack that is not directly accessible. Examples are the PIC microcontrollers, the Computer CowboysMuP21, the Harris RTX line, and the NovixNC4016. At least one microcontroller family, the COP400, implements a stack either directly in hardware or in RAM via a stack pointer, depending on the device. Many stack-based microprocessors were used to implement the programming language Forth at the microcode level.
Applications of stacks
Expression evaluation and syntax parsing
Calculators that employ reverse Polish notation use a stack structure to hold values. Expressions can be represented in prefix, postfix or infix notations and conversion from one form to another may be accomplished using a stack. Many compilers use a stack to parse syntax before translation into low-level code. Most programming languages are context-free languages, allowing them to be parsed with stack-based machines.
Another important application of stacks is backtracking. An illustration of this is the simple example of finding the correct path in a maze that contains a series of points, a starting point, several paths and a destination. If random paths must be chosen, then after following an incorrect path, there must be a method by which to return to the beginning of that path. This can be achieved through the use of stacks, as a last correct point can be pushed onto the stack, and popped from the stack in case of an incorrect path.
The prototypical example of a backtracking algorithm is depth-first search, which finds all vertices of a graph that can be reached from a specified starting vertex. Other applications of backtracking involve searching through spaces that represent potential solutions to an optimization problem. Branch and bound is a technique for performing such backtracking searches without exhaustively searching all of the potential solutions in such a space.
A number of programming languages are stack-oriented, meaning they define most basic operations (adding two numbers, printing a character) as taking their arguments from the stack, and placing any return values back on the stack. For example, PostScript has a return stack and an operand stack, and also has a graphics state stack and a dictionary stack. Many virtual machines are also stack-oriented, including the p-code machine and the Java Virtual Machine.
Almost all calling conventions—the ways in which subroutines receive their parameters and return results—use a special stack (the "call stack") to hold information about procedure/function calling and nesting in order to switch to the context of the called function and restore to the caller function when the calling finishes. The functions follow a runtime protocol between caller and callee to save arguments and return value on the stack. Stacks are an important way of supporting nested or recursive function calls. This type of stack is used implicitly by the compiler to support CALL and RETURN statements (or their equivalents) and is not manipulated directly by the programmer.
Some programming languages use the stack to store data that is local to a procedure. Space for local data items is allocated from the stack when the procedure is entered, and is deallocated when the procedure exits. The C programming language is typically implemented in this way. Using the same stack for both data and procedure calls has important security implications (see below) of which a programmer must be aware in order to avoid introducing serious security bugs into a program.
Efficient algorithms
Several algorithms use a stack (separate from the usual function call stack of most programming languages) as the principal data structure with which they organize their information. These include:
Graham scan, an algorithm for the convex hull of a two-dimensional system of points. A convex hull of a subset of the input is maintained in a stack, which is used to find and remove concavities in the boundary when a new point is added to the hull.[20]
Part of the SMAWK algorithm for finding the row minima of a monotone matrix uses stacks in a similar way to Graham scan.[21]
All nearest smaller values, the problem of finding, for each number in an array, the closest preceding number that is smaller than it. One algorithm for this problem uses a stack to maintain a collection of candidates for the nearest smaller value. For each position in the array, the stack is popped until a smaller value is found on its top, and then the value in the new position is pushed onto the stack.[22]
The nearest-neighbor chain algorithm, a method for agglomerative hierarchical clustering based on maintaining a stack of clusters, each of which is the nearest neighbor of its predecessor on the stack. When this method finds a pair of clusters that are mutual nearest neighbors, they are popped and merged.[23]
Security
Some computing environments use stacks in ways that may make them vulnerable to security breaches and attacks. Programmers working in such environments must take special care to avoid such pitfalls in these implementations.
As an example, some programming languages use a common stack to store both data local to a called procedure and the linking information that allows the procedure to return to its caller. This means that the program moves data into and out of the same stack that contains critical return addresses for the procedure calls. If data is moved to the wrong location on the stack, or an oversized data item is moved to a stack location that is not large enough to contain it, return information for procedure calls may be corrupted, causing the program to fail.
Malicious parties may attempt a stack smashing attack that takes advantage of this type of implementation by providing oversized data input to a program that does not check the length of input. Such a program may copy the data in its entirety to a location on the stack, and in doing so, it may change the return addresses for procedures that have called it. An attacker can experiment to find a specific type of data that can be provided to such a program such that the return address of the current procedure is reset to point to an area within the stack itself (and within the data provided by the attacker), which in turn contains instructions that carry out unauthorized operations.
This type of attack is a variation on the buffer overflow attack and is an extremely frequent source of security breaches in software, mainly because some of the most popular compilers use a shared stack for both data and procedure calls, and do not verify the length of data items. Frequently, programmers do not write code to verify the size of data items, either, and when an oversized or undersized data item is copied to the stack, a security breach may occur.
^Turing, Alan Mathison (1946-03-19) [1945]. Proposals for Development in the Mathematics Division of an Automatic Computing Engine (ACE). (NB. Presented on 1946-03-19 before the Executive Committee of the National Physical Laboratory (Great Britain).)
^LaForest, Charles Eric (April 2007). "2.1 Lukasiewicz and the First Generation: 2.1.2 Germany: Konrad Zuse (1910–1995); 2.2 The First Generation of Stack Computers: 2.2.1 Zuse Z4". Second-Generation Stack Computer Architecture(PDF) (thesis). Waterloo, Canada: University of Waterloo. pp. 8, 11. Archived(PDF) from the original on 2022-01-20. Retrieved 2022-07-02. (178 pages)
^Samelson, Klaus (1957) [1955]. Written at Internationales Kolloquium über Probleme der Rechentechnik, Dresden, Germany. Probleme der Programmierungstechnik (in German). Berlin, Germany: VEB Deutscher Verlag der Wissenschaften. pp. 61–68. (NB. This paper was first presented in 1955. It describes a number stack (Zahlenkeller), but names it linear auxiliary memory (linearer Hilfsspeicher).)
^Bauer, Friedrich Ludwig; Goos, Gerhard[in German] (1982). Informatik – Eine einführende Übersicht (in German). Vol. Part 1 (3 ed.). Berlin: Springer-Verlag. p. 222. ISBN3-540-11722-9. Die Bezeichnung 'Keller' hierfür wurde von Bauer und Samelson in einer deutschen Patentanmeldung vom 30. März 1957 eingeführt.
^Samelson, Klaus; Bauer, Friedrich Ludwig (1959). "Sequentielle Formelübersetzung" [Sequential Formula Translation]. Elektronische Rechenanlagen (in German). 1 (4): 176–182.
Operación Inundación de Al-Aqsa Parte de Guerra Israel-Gaza Edificio residencial quemado en el kibutz de Beeri tras el ataque.Fecha 7-9 de octubre de 2023Lugar Sur de IsraelCoordenadas 31°21′49″N 34°30′28″E / 31.363527777778, 34.507694444444Resultado Hamás, junto con otros grupos palestinos, traspasa la barrera entre Israel y Gaza y ocupa varias zonas israelíes.Consecuencias El ataque fue repelido tras numerosas bajas civiles y militares y se inició la Guerra Is...
Woodwind musical instrument This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Fife instrument – news · newspapers · books · scholar · JSTOR (May 2020) (Learn how and when to remove this template message) FifeCrosby-style fife made by George and Frederick CloosWoodwind instrumentClassification Wind Woodwin...
DiceSampul versi Digital dan RollingAlbum mini karya OnewDirilis11 April 2022GenreK-popDurasi20:59BahasaKoreaLabelSMDreamusProduserHitchhikerCha Cha MaloneCook ClassiosSam KlempnerScott QuinnLostboyThe 6Dirty RiceM. LeeKronologi Onew Voice(2018) Dice(2022) Life Goes On(2022) Singel dalam album Dice DiceDirilis: 11 April 2022 Dice adalah album mini kedua dari penyanyi Korea Selatan Onew. Album ini dirilis pada tanggal 11 April 2022, melalui SM Entertainment. Album mini ini terdiri dari ena...
DAZN Stato Regno Unito Tipologia Over-the-top Trasmissione Pay TV e Free to air Gruppo DAZN Group Data di lancio 8 luglio 2015 Sede principale Londra Nº abbonati 8 000 000 (2019, ) Slogan Nella vita di un tifoso. Sito dazn.com Dati tecnici Lingua inglese, italiano, francese, spagnolo, portoghese, tedesco, giapponese Standard Streaming Linea ADSL2+ / VDSL2 / Fibra / 3G / 4G / 5G DAZN (pronuncia inglese [dəˈzoʊn]) è un servizio a pagamento in streaming di eventi sportivi, ...
Spanish nanosatellite OPTOSThe satellite in its launch configurationMission typeTechnology demonstration, scientific experimentation.OperatorINTACOSPAR ID2013-066E SATCAT no.39420Mission duration3 years Spacecraft propertiesManufacturerINTADry mass3.8 kgDimensions10 x 10 x 34.5 cmPower7.2 W Start of missionLaunch date21 November 2013RocketDneprLaunch siteDombarovsky End of missionLast contact17 December 2017 PayloadAPIS, FIBOS, GMR, ODM OPTOS was a Spanish nanosatellite designed and dev...
Louis-Nicolas Clérambault Un compositor es aquella persona «que hace composiciones musicales».[1] Es quien sabe escribir composiciones musicales según las normas artísticas, donde básicamente organiza una serie de sonidos teniendo como base los parámetros de la teoría. Existen el compositor dramático, que compone óperas, y el compositor sinfónico, que compone música sinfónica.[2] El compositor es aquel que inventa música trabajando los sonidos de forma imaginativa ...
Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Maret 2016. Han Xiu (Hanzi: 韩休, 672-739), Bangsawan Wenzhong dari Yiyang (宜阳文忠子), adalah seorang pejabat pada pertengahan Dinasti Tang yang terkenal akan keterusterangan dan kejujurannya. Ia sempat menjabat sebagai perdana menteri pada masa pemerintaha...
2012 NCAA Division I FBS football rankingsSeason2012Bowl season2012–13 bowl gamesPreseason No. 1USC (AP)LSU (Coaches) End of season championsAlabamaConference with mostteams in final AP pollSEC (7)NCAA Division I FBS football rankings ← 20112013 → Three human polls and one formula ranking make up the 2012 NCAA Division I FBS (Football Bowl Subdivision) football rankings, in addition to various publications' preseason polls. Unlike most sports, college football's gover...
Milos MasarykUnicorno ha battuto Iron Man, disegni di Tuska/Craig UniversoUniverso Marvel Lingua orig.Inglese AutoriStan Lee Jack Kirby EditoreMarvel Comics 1ª app.agosto 1964 1ª app. inTales of Suspense n. 56 Editore it.Editoriale Corno Caratteristiche immaginarieSpecieumano SessoMaschio Etniarussa PoteriForza e resistenza sovrumane grazie all'esposizione a radiazioni Affiliazione Maggia L'Unicorno è il nome in codice di diversi supercriminali apparsi nei fumetti della Marve...
Muzakkar A. Gani Bupati Bireuen ke-6Masa jabatan18 Juni 2020 – 10 Agustus 2022Penjabat: 19 Januari 2020—18 Juni 2020PresidenJoko WidodoGubernurNova Iriansyah (Plt.)PendahuluSaifannurPenggantiPetahanaWakil Bupati Bireuen ke-4Masa jabatan22 Mei 2017 – 19 Januari 2020PendahuluMukhtarPenggantiPetahana Informasi pribadiLahir7 Desember 1959 (umur 64)Meunasah Krueng Dhoe, Kembang Tanjong, Pidie, AcehKebangsaanIndonesiaPartai politikDemokratSuami/istriHj. Nurjanna...
此條目需要补充更多来源。 (2021年7月4日)请协助補充多方面可靠来源以改善这篇条目,无法查证的内容可能會因為异议提出而被移除。致使用者:请搜索一下条目的标题(来源搜索:美国众议院 — 网页、新闻、书籍、学术、图像),以检查网络上是否存在该主题的更多可靠来源(判定指引)。 美國眾議院 United States House of Representatives第118届美国国会众议院徽章 众议院旗...
1940 United States Senate election in Washington ← 1934 November 5, 1940 1946 → Nominee Monrad Wallgren Stephen F. Chadwick Party Democratic Republican Popular vote 404,718 342,589 Percentage 54.16% 45.84% County resultsWallgren: 50–60% 60–70% Chadwick: 50–60% 60–70% 70–80% U.S. senator before electio...
Algerian al-Qaeda member Abdelhamid Abou ZeidAbdelhamid Abou Zeid, one of the leaders of AQIM.Born(1965-12-12)December 12, 1965[1]AlgeriaDied25 February 2013(2013-02-25) (aged 47)Other namesEmir of the South; Mosab Abdelouadoud[2]Military careerAllegiance Al-QaedaService/branch AQIM (?–2013)Years of service?-2013RankGovernor (Emir) of TimbuktuBattles/warsInsurgency in the Maghreb Operation Enduring Freedom – Trans Sahara Northern Mali conflict Battle of Diab...
Flooding in Downtown New Orleans caused by Hurricane Katrina From 2000 to the present, at least 28 tropical or subtropical cyclones affected the U.S. state of Louisiana. According to David Roth of the Hydrometeorological Prediction Center (HPC), a tropical cyclone makes landfall along the coastline about two times every three years, and a hurricane makes landfall once every 2.8 years.[1] The most active month for tropical cyclone activity in the state is September, with ten...
Ziya BunyadovLahir21 Desember 1923Astara, Respublik Sosialis Federatif Soviet Transkaukasia, Uni SovietMeninggal21 Februari 1997(1997-02-21) (umur 73)Baku, AzerbaijanPengabdian Uni Soviet AzerbaijanLama dinas1942 - 1945 Ziya Musa oglu Bunyadov (bahasa Azerbaijan: Ziya Bünyadov juga disebut Zia Buniatov atau Bunyatov) (21 Desember 1923 – 21 Februari 1997) adalah seorang sejarawan, akademisi dan Wakil Presiden Akademi Sains Nasional Azerbaijan. Sebagai s...
Konklaf Agustus–September 1676Lambang Kekosongan Takhta SuciTanggal dan lokasi2 Agustus – 21 September 1676Istana Apostolik, Negara GerejaPejabat pentingKetuaFrancesco BarberiniWakil KetuaUlderico CarpegnaCamerlengoPaluzzo Paluzzi Altieri degli AlbertoniProto-imamCarlo RosettiProto-diakonFrancesco MaidalchiniPaus terpilihBenedetto Odescalchi(Nama pilihan: Innosensius XI)← 1669–16701689 → Konklaf 1676 diadakan setelah kematian Paus Klemens X dan berlangsung dari 2 Agustus s...
RD SlovanFull nameRokometno društvo SlovanFounded1949; 75 years ago (1949)[1]ArenaKodeljevo HallCapacity1,540PresidentKrištof MlakarHead coachUroš ZormanLeagueSlovenian First League2023–24Slovenian First League, 9th of 14Club colours Home Away Website Official site Rokometno društvo Slovan, commonly referred to as RD Slovan or simply Slovan, is a handball club from Ljubljana, Slovenia. Arena RD Slovan play their home matches at Kode...