Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 39 for evaluated (0.05 sec)

  1. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  3. api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java

         * where the property value is defined.
         */
        enum Source {
            /**
             * Maven system properties. These properties are evaluated very early during the boot process,
             * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Thu Jul 03 14:18:26 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  4. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  5. src/cmd/asm/internal/asm/expr_test.go

    	for i, test := range exprTests {
    		p.start(lex.Tokenize(test.input))
    		result := int64(p.expr())
    		if result != test.output {
    			t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output)
    		}
    		tok := p.next()
    		if test.atEOF && tok.ScanToken != scanner.EOF {
    			t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 29 07:48:38 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  6. fess-crawler/src/main/java/org/codelibs/fess/crawler/rule/Rule.java

     */
    public interface Rule extends Serializable {
    
        /**
         * Determines if the given response data matches the rule.
         *
         * @param responseData the response data to be evaluated
         * @return true if the response data matches the rule, false otherwise
         */
        boolean match(ResponseData responseData);
    
        /**
         * Retrieves the unique identifier for the rule.
         *
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sat Mar 15 06:52:00 UTC 2025
    - 1.7K bytes
    - Viewed (0)
  7. docs/batch-jobs/README.md

    ## Batch Jobs Terminology
    
    ### Job
    A job is the basic unit of work for MinIO Batch Job. A job is a self describing YAML, once this YAML is submitted and evaluated - MinIO performs the requested actions on each of the objects obtained under the described criteria in job YAML file.
    
    ### Type
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Oct 06 06:00:43 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  9. ci/official/utilities/setup.sh

      # Assumes variables will resolve themselves correctly.
      set +u
      for env_file in ${TFCI//,/ }; do
        source "./ci/official/envs/$env_file"
      done
      set -u
      echo '==TFCI==: Evaluated the following TFCI variables from $TFCI:'
      export -p | grep TFCI
    
      # Load those stored pre-existing TFCI_ vars, if any
      if [[ -s "$FROM_ENV" ]]; then
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Thu Jan 09 18:37:25 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  10. docs/select/README.md

    - All aggregation, conditional, type-conversion and string functions are supported.
    - JSON path expressions such as `FROM S3Object[*].path` are not yet evaluated.
    - Large numbers (outside of the signed 64-bit range) are not yet supported.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6.6K bytes
    - Viewed (0)
Back to top