Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 95 for evaluated (0.08 sec)

  1. guava/src/com/google/common/base/Predicates.java

       * Returns a predicate that evaluates to {@code true} if any one of its components evaluates to
       * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited"
       * as soon as a true predicate is found. It defensively copies the iterable passed in, so future
       * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the
       * returned predicate will always evaluate to {@code false}.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  2. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  4. api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java

         * where the property value is defined.
         */
        enum Source {
            /**
             * Maven system properties. These properties are evaluated very early during the boot process,
             * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Thu Jul 03 14:18:26 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  5. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  6. src/cmd/asm/internal/asm/expr_test.go

    	for i, test := range exprTests {
    		p.start(lex.Tokenize(test.input))
    		result := int64(p.expr())
    		if result != test.output {
    			t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output)
    		}
    		tok := p.next()
    		if test.atEOF && tok.ScanToken != scanner.EOF {
    			t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 29 07:48:38 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  7. fess-crawler/src/main/java/org/codelibs/fess/crawler/rule/Rule.java

     */
    public interface Rule extends Serializable {
    
        /**
         * Determines if the given response data matches the rule.
         *
         * @param responseData the response data to be evaluated
         * @return true if the response data matches the rule, false otherwise
         */
        boolean match(ResponseData responseData);
    
        /**
         * Retrieves the unique identifier for the rule.
         *
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sat Mar 15 06:52:00 UTC 2025
    - 1.7K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/crawler/transformer/FessTransformer.java

         * The template is evaluated using the specified script engine with the value and context.
         *
         * @param dataMap the data map to modify
         * @param key the key to store the processed value under
         * @param value the original value to process
         * @param template the template script to evaluate
         * @param scriptType the type of script engine to use
         */
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  10. ci/official/utilities/setup.sh

      # Assumes variables will resolve themselves correctly.
      set +u
      for env_file in ${TFCI//,/ }; do
        source "./ci/official/envs/$env_file"
      done
      set -u
      echo '==TFCI==: Evaluated the following TFCI variables from $TFCI:'
      export -p | grep TFCI
    
      # Load those stored pre-existing TFCI_ vars, if any
      if [[ -s "$FROM_ENV" ]]; then
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Thu Jan 09 18:37:25 UTC 2025
    - 6.2K bytes
    - Viewed (0)
Back to top