- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 16 for feat (0.06 sec)
-
android/guava-tests/benchmark/com/google/common/io/ByteSourceAsCharSourceReadBenchmark.java
// one. (StringCoding$StringDecoder vs. StreamDecoder). StringCoding has a ton of special cases // theoretically we could duplicate all that logic here to try to beat 'new String' or at least // come close. USING_DECODER_WITH_SIZE_HINT { @Override String read(ByteSource byteSource, Charset cs) throws IOException { Optional<Long> size = byteSource.sizeIfKnown();Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 5.2K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Interners.java
// didn't see it, trying to put it instead... Dummy sneaky = map.putIfAbsent(sample, Dummy.VALUE); if (sneaky == null) { return sample; } else { /* Someone beat us to it! Trying again... * * Technically this loop not guaranteed to terminate, so theoretically (extremely * unlikely) this thread might starve, but even then, there is always going to be anotherRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 6K bytes - Viewed (0) -
guava/src/com/google/common/collect/Interners.java
// didn't see it, trying to put it instead... Dummy sneaky = map.putIfAbsent(sample, Dummy.VALUE); if (sneaky == null) { return sample; } else { /* Someone beat us to it! Trying again... * * Technically this loop not guaranteed to terminate, so theoretically (extremely * unlikely) this thread might starve, but even then, there is always going to be anotherRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
// DesCipher - the DES encryption method // // The meat of this code is by Dave Zimmerman <******@****.***>, and is: // // Copyright (c) 1996 Widget Workshop, Inc. All Rights Reserved. // // Permission to use, copy, modify, and distribute this software // and its documentation for NON-COMMERCIAL or COMMERCIAL purposes and // without fee is hereby granted, provided that this copyright notice is kept // intact. //
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java
// but work beyond that must take at least one second assertThat(afterBurst).isAtLeast(1000); } } /** * This neat test shows that no matter what weights we use in our requests, if we push X amount of * permits in a cool state, where X = rate * timeToCoolDown, and we have specified aRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 21.9K bytes - Viewed (0) -
guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java
// but work beyond that must take at least one second assertThat(afterBurst).isAtLeast(1000); } } /** * This neat test shows that no matter what weights we use in our requests, if we push X amount of * permits in a cool state, where X = rate * timeToCoolDown, and we have specified aRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 21.9K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.)
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.)
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/HashBiMap.java
* that behavior is undefined when the backing map is modified through another API. (It even * permits us to throw IllegalStateException. Maybe we should have done that, but we probably * shouldn't change now for fear of breaking people.) * * If the entry is still in the map, then updateIndex ensured that `index` points to the right * element. Because that element is present, uncheckedCastNullableTToT is safe. */Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Dec 16 14:46:34 UTC 2025 - 37.1K bytes - Viewed (0) -
fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml
<mime-type type="application/vnd.oasis.opendocument.flat.text"> <_comment>OpenDocument v1.0: Flat Text document</_comment> <glob pattern="*.fodt"/> <sub-class-of type="application/vnd.oasis.opendocument.tika.flat.document"/> </mime-type> <mime-type type="application/vnd.oasis.opendocument.flat.presentation"> <_comment>OpenDocument v1.0: Flat Presentation document</_comment> <glob pattern="*.fodp"/>
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Oct 16 07:46:32 UTC 2025 - 320.2K bytes - Viewed (5)