- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 12 for proof (0.07 seconds)
-
android/guava/src/com/google/common/primitives/UnsignedLongs.java
* guaranteed to be either exact or one less than the correct value. This follows from fact that * floor(floor(x)/i) == floor(x/i) for any real x and integer i != 0. The proof is not quite * trivial. */ long quotient = ((dividend >>> 1) / divisor) << 1; long rem = dividend - quotient * divisor; return quotient + (compare(rem, divisor) >= 0 ? 1 : 0); }Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Jan 05 22:13:21 GMT 2026 - 17.8K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Hashing.java
* MD5 (128 hash bits) hash function and the given secret key. * * <p>If you are designing a new system that needs HMAC, prefer {@link #hmacSha256} or other * future-proof algorithms <a * href="https://datatracker.ietf.org/doc/html/rfc6151#section-2.3">over {@code hmacMd5}</a>. * * @param key the secret key
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jul 17 15:26:41 GMT 2025 - 29.8K bytes - Click Count (0) -
android/guava/src/com/google/common/base/Equivalence.java
Wrapper<?> that = (Wrapper<?>) obj; // note: not necessarily a Wrapper<T> if (this.equivalence.equals(that.equivalence)) { /* * We'll accept that as sufficient "proof" that either equivalence should be able to * handle either reference, so it's safe to circumvent compile-time type checking. */ @SuppressWarnings("unchecked")
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jul 10 01:47:55 GMT 2025 - 14.5K bytes - Click Count (0) -
guava/src/com/google/common/base/Equivalence.java
Wrapper<?> that = (Wrapper<?>) obj; // note: not necessarily a Wrapper<T> if (this.equivalence.equals(that.equivalence)) { /* * We'll accept that as sufficient "proof" that either equivalence should be able to * handle either reference, so it's safe to circumvent compile-time type checking. */ @SuppressWarnings("unchecked")
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jul 10 01:47:55 GMT 2025 - 15K bytes - Click Count (0) -
doc/go_mem.html
meaning it has no program executions with read-write or write-write data races, can only have outcomes explained by some sequentially consistent interleaving of the goroutine executions. (The proof is the same as Section 7 of Boehm and Adve's paper cited above.) This property is called DRF-SC. </p> <p> The intent of the formal definition is to match the DRF-SC guarantee provided to race-free programs
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Aug 05 15:41:37 GMT 2025 - 26.6K bytes - Click Count (0) -
cmd/utils.go
} dst := make(map[string][]byte, len(globalProfiler)) for typ, prof := range globalProfiler { // Stop the profiler var err error buf, err := prof.Stop() delete(globalProfiler, typ) if err == nil { dst[typ+"."+prof.Extension()] = buf } for name, buf := range prof.Records() { if len(buf) > 0 { dst[typ+"-"+name+"."+prof.Extension()] = buf } } } return dst, nil }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 33K bytes - Click Count (0) -
compat/maven-settings-builder/src/test/java/org/apache/maven/settings/validation/DefaultSettingsValidatorTest.java
Profile prof = new Profile(); prof.setId("xxx"); model.addProfile(prof); SimpleProblemCollector problems = new SimpleProblemCollector(); validator.validate(model, problems); assertEquals(0, problems.messages.size()); Repository repo = new Repository(org.apache.maven.api.settings.Repository.newInstance(false)); prof.addRepository(repo);
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Fri Jun 06 14:28:57 GMT 2025 - 8.5K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
extended binary GCD algorithm described in the Handbook of // Applied Cryptography, Algorithm 14.61, adapted by BoringSSL to bound // coefficients and avoid negative numbers. For more details and proof of // correctness, see https://github.com/mit-plv/fiat-crypto/pull/333/files. // // Following the proof linked in the PR above, the changes are: // // 1. Negate [B] and [C] so they are positive. The invariant now involves a // subtraction. // 2. If step 2 (both [x] and [y] are even) runs, abort immediately....
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
cmd/admin-handlers.go
// Start profiling locally as well. prof, err := startProfiler(profiler) if err != nil { hostErrs = append(hostErrs, NotificationPeerErr{ Host: *thisAddr, Err: err, }) } else { globalProfiler[profiler] = prof hostErrs = append(hostErrs, NotificationPeerErr{ Host: *thisAddr, }) } }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 99.7K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
extended binary GCD algorithm described in the Handbook of // Applied Cryptography, Algorithm 14.61, adapted by BoringSSL to bound // coefficients and avoid negative numbers. For more details and proof of // correctness, see https://github.com/mit-plv/fiat-crypto/pull/333/files. // // Following the proof linked in the PR above, the changes are: // // 1. Negate [B] and [C] so they are positive. The invariant now involves a // subtraction. // 2. If step 2 (both [x] and [y] are even) runs, abort immediately....
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0)