Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 244 for manner (0.04 sec)

  1. fess-crawler/src/main/java/org/codelibs/fess/crawler/service/impl/DataServiceImpl.java

     * The class uses a static {@code idCount} to generate unique IDs for each access result.
     * The {@code idCountLock} object is used to synchronize access to the {@code idCount} variable,
     * ensuring that IDs are generated in a thread-safe manner.
     * </p>
     *
     * <p>
     * The class also provides methods to get the count of access results for a given session,
     * to delete all access results for a given session, and to delete all access results.
     * </p>
     *
    Registered: Sat Dec 20 11:21:39 UTC 2025
    - Last Modified: Mon Nov 24 03:59:47 UTC 2025
    - 6.9K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/hash/Hashing.java

       */
      public static HashFunction fingerprint2011() {
        return Fingerprint2011.FINGERPRINT_2011;
      }
    
      /**
       * Assigns to {@code hashCode} a "bucket" in the range {@code [0, buckets)}, in a uniform manner
       * that minimizes the need for remapping as {@code buckets} grows. That is, {@code
       * consistentHash(h, n)} equals:
       *
       * <ul>
       *   <li>{@code n - 1}, with approximate probability {@code 1/n}
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Jul 17 15:26:41 UTC 2025
    - 29.8K bytes
    - Viewed (0)
  3. guava/src/com/google/common/primitives/Shorts.java

        reverse(array, newFirstIndex, toIndex);
        reverse(array, fromIndex, toIndex);
      }
    
      /**
       * Returns an array containing each value of {@code collection}, converted to a {@code short}
       * value in the manner of {@link Number#shortValue}.
       *
       * <p>Elements are copied from the argument collection as if by {@code collection.toArray()}.
       * Calling this method is as thread-safe as calling that method.
       *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 22 18:14:49 UTC 2025
    - 25.7K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/primitives/Shorts.java

        reverse(array, newFirstIndex, toIndex);
        reverse(array, fromIndex, toIndex);
      }
    
      /**
       * Returns an array containing each value of {@code collection}, converted to a {@code short}
       * value in the manner of {@link Number#shortValue}.
       *
       * <p>Elements are copied from the argument collection as if by {@code collection.toArray()}.
       * Calling this method is as thread-safe as calling that method.
       *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 22 18:14:49 UTC 2025
    - 25.7K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/util/concurrent/JSR166TestCase.java

      /**
       * Runs Runnable r with a security policy that permits precisely the specified permissions. If
       * there is no current security manager, the runnable is run twice, both with and without a
       * security manager. We require that any security manager permit getPolicy/setPolicy.
       */
      public void runWithPermissions(Runnable r, Permission... permissions) {
        SecurityManager sm = System.getSecurityManager();
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Dec 11 20:07:52 UTC 2025
    - 37.8K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/base/Equivalence.java

    import org.jspecify.annotations.NonNull;
    import org.jspecify.annotations.Nullable;
    
    /**
     * A strategy for determining whether two instances are considered equivalent, and for computing
     * hash codes in a manner consistent with that equivalence. Two examples of equivalences are the
     * {@linkplain #identity() identity equivalence} and the {@linkplain #equals "equals" equivalence}.
     *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Jul 10 01:47:55 UTC 2025
    - 14.5K bytes
    - Viewed (0)
  7. guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

          }
          return message.toString();
        }
      }
    
      /**
       * Internal Lock implementations implement the {@code CycleDetectingLock} interface, allowing the
       * detection logic to treat all locks in the same manner.
       */
      private interface CycleDetectingLock {
    
        /**
         * @return the {@link LockGraphNode} associated with this lock.
         */
        LockGraphNode getLockGraphNode();
    
        /**
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Sep 11 17:06:34 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  8. guava/src/com/google/common/primitives/Floats.java

        reverse(array, newFirstIndex, toIndex);
        reverse(array, fromIndex, toIndex);
      }
    
      /**
       * Returns an array containing each value of {@code collection}, converted to a {@code float}
       * value in the manner of {@link Number#floatValue}.
       *
       * <p>Elements are copied from the argument collection as if by {@code collection.toArray()}.
       * Calling this method is as thread-safe as calling that method.
       *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 22 18:14:49 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/primitives/Ints.java

        reverse(array, newFirstIndex, toIndex);
        reverse(array, fromIndex, toIndex);
      }
    
      /**
       * Returns an array containing each value of {@code collection}, converted to a {@code int} value
       * in the manner of {@link Number#intValue}.
       *
       * <p>Elements are copied from the argument collection as if by {@code collection.toArray()}.
       * Calling this method is as thread-safe as calling that method.
       *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 22 18:14:49 UTC 2025
    - 31.3K bytes
    - Viewed (0)
  10. LICENSES/vendor/cyphar.com/go-pathrs/LICENSE

        Form, as described in Section 3.1, and You must inform recipients of
        the Executable Form how they can obtain a copy of such Source Code
        Form by reasonable means in a timely manner, at a charge no more
        than the cost of distribution to the recipient; and
    
    (b) You may distribute such Executable Form under the terms of this
        License, or sublicense it under different terms, provided that the
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Wed Nov 12 14:46:31 UTC 2025
    - 16.5K bytes
    - Viewed (0)
Back to top