- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 94 for evaluated (0.15 sec)
-
guava/src/com/google/common/base/Predicates.java
* Returns a predicate that evaluates to {@code true} if any one of its components evaluates to * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited" * as soon as a true predicate is found. It defensively copies the iterable passed in, so future * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the * returned predicate will always evaluate to {@code false}. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 26.6K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java
super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause); this.expression = expression; this.originalMessage = message; } public ModelInterpolationException(String expression, String message) { super("The POM expression: " + expression + " could not be evaluated. Reason: " + message); this.expression = expression;
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 1.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java
* where the property value is defined. */ enum Source { /** * Maven system properties. These properties are evaluated very early during the boot process, * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Thu Jul 03 14:18:26 UTC 2025 - 4.3K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/rule/Rule.java
*/ public interface Rule extends Serializable { /** * Determines if the given response data matches the rule. * * @param responseData the response data to be evaluated * @return true if the response data matches the rule, false otherwise */ boolean match(ResponseData responseData); /** * Retrieves the unique identifier for the rule. *
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Sat Mar 15 06:52:00 UTC 2025 - 1.7K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/crawler/transformer/FessTransformer.java
* The template is evaluated using the specified script engine with the value and context. * * @param dataMap the data map to modify * @param key the key to store the processed value under * @param value the original value to process * @param template the template script to evaluate * @param scriptType the type of script engine to use */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 13.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
ci/official/utilities/setup.sh
# Assumes variables will resolve themselves correctly. set +u for env_file in ${TFCI//,/ }; do source "./ci/official/envs/$env_file" done set -u echo '==TFCI==: Evaluated the following TFCI variables from $TFCI:' export -p | grep TFCI # Load those stored pre-existing TFCI_ vars, if any if [[ -s "$FROM_ENV" ]]; then
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Jan 09 18:37:25 UTC 2025 - 6.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/CrawlerStatsHelper.java
CHILD_URL, /** Indicates that multiple child URLs were discovered. */ CHILD_URLS, /** Indicates that a URL was evaluated for crawling eligibility. */ EVALUATED, /** Indicates that a general exception occurred during processing. */ EXCEPTION, /** Indicates that processing of a URL has finished. */ FINISHED,
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 17.4K bytes - Viewed (0)