- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for suggestions (0.2 sec)
-
guava-tests/benchmark/com/google/common/collect/SortedCopyBenchmark.java
import java.util.TreeSet; /** * Provides supporting data for performance notes in the documentation of {@link * Ordering#sortedCopy} and {@link Ordering#immutableSortedCopy}, as well as for automated code * suggestions. * */ public class SortedCopyBenchmark { @Param({"1", "10", "1000", "1000000"}) int size; // logarithmic triangular @Param boolean mutable; @Param InputOrder inputOrder;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 3.5K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/collect/SortedCopyBenchmark.java
import java.util.TreeSet; /** * Provides supporting data for performance notes in the documentation of {@link * Ordering#sortedCopy} and {@link Ordering#immutableSortedCopy}, as well as for automated code * suggestions. * */ public class SortedCopyBenchmark { @Param({"1", "10", "1000", "1000000"}) int size; // logarithmic triangular @Param boolean mutable; @Param InputOrder inputOrder;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 3.5K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand. But in the end, they are implementing the same OAuth2 standard.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0)