- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 149 for wise (0.03 sec)
-
android/guava/src/com/google/common/hash/Fingerprint2011.java
* fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. * * <p>Note to maintainers: This implementation relies on signed arithmetic being bit-wise equivalent * to unsigned arithmetic in all cases except: * * <ul> * <li>comparisons (signed values can be negative) * <li>division (avoided here) * <li>shifting (right shift must be unsigned) * </ul>
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/Fingerprint2011.java
* fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. * * <p>Note to maintainers: This implementation relies on signed arithmetic being bit-wise equivalent * to unsigned arithmetic in all cases except: * * <ul> * <li>comparisons (signed values can be negative) * <li>division (avoided here) * <li>shifting (right shift must be unsigned) * </ul>
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbResourceLocatorImpl.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 23.6K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hashing.java
* * <p>This is designed for generating persistent fingerprints of strings. It isn't * cryptographically secure, but it produces a high-quality hash with few collisions. Fingerprints * generated using this are byte-wise identical to those created using the C++ version, but note * that this uses unsigned integers (see {@link com.google.common.primitives.UnsignedInts}). * Comparisons between the two should take this into account. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 29.8K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hashing.java
* * <p>This is designed for generating persistent fingerprints of strings. It isn't * cryptographically secure, but it produces a high-quality hash with few collisions. Fingerprints * generated using this are byte-wise identical to those created using the C++ version, but note * that this uses unsigned integers (see {@link com.google.common.primitives.UnsignedInts}). * Comparisons between the two should take this into account. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:06:57 UTC 2025 - 31.1K bytes - Viewed (0) -
RELEASE.md
[`tf.distribute.experimental.PreemptionCheckpointHandler`](https://www.tensorflow.org/api_docs/python/tf/distribute/experimental/PreemptionCheckpointHandler) to handle worker preemption/maintenance and cluster-wise consistent error reporting for `tf.distribute.MultiWorkerMirroredStrategy`. Specifically, for the type of interruption with advance notice, itRegistered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2) -
docs/yo/docs/index.md
Tí o kò bá mọ̀, ṣàyẹ̀wò ibi tí a ti ní _"In a hurry?"_ (i.e. _"Ní kíákíá?"_) nípa <a href="https://fastapi.tiangolo.com/async/#in-a-hurry" target="_blank">`async` and `await` nínú àkọsílẹ̀</a>. </details> ### Mu ṣiṣẹ Mú olupin ṣiṣẹ pẹ̀lú: <div class="termy"> ```console $ uvicorn main:app --reload INFO: Uvicorn running on http://127.0.0.1:8000 (Press CTRL+C to quit) INFO: Started reloader process [28720]
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 24.1K bytes - Viewed (0) -
docs/de/docs/advanced/generate-clients.md
Aber ich zeige Ihnen als nächstes, wie Sie das verbessern können. 🤓 ## Benutzerdefinierte Operation-IDs und bessere Methodennamen Sie können die Art und Weise, wie diese Operation-IDs **generiert** werden, **ändern**, um sie einfacher zu machen und **einfachere Methodennamen** in den Clients zu haben. In diesem Fall müssen Sie auf andere Weise sicherstellen, dass jede Operation-ID **eindeutig** ist.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Tue Jun 17 11:53:56 UTC 2025 - 11.4K bytes - Viewed (0) -
docs/de/docs/tutorial/security/index.md
Heutzutage ist es nicht sehr populär und wird kaum verwendet. OAuth2 spezifiziert nicht, wie die Kommunikation verschlüsselt werden soll, sondern erwartet, dass Ihre Anwendung mit HTTPS bereitgestellt wird. /// tip | Tipp Im Abschnitt über **Deployment** erfahren Sie, wie Sie HTTPS mithilfe von Traefik und Let's Encrypt kostenlos einrichten.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 5.1K bytes - Viewed (0) -
doc/go_spec.html
equal if both <code>real(u) == real(v)</code> and <code>imag(u) == imag(v)</code>. </li> <li> String types are comparable and ordered. Two string values are compared lexically byte-wise. </li> <li> Pointer types are comparable. Two pointer values are equal if they point to the same variable or if both have value <code>nil</code>.
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue May 06 19:12:15 UTC 2025 - 286.2K bytes - Viewed (0)