Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 138 for evaluated (0.05 seconds)

  1. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Fri Oct 25 12:31:46 GMT 2024
    - 1.9K bytes
    - Click Count (0)
  2. guava/src/com/google/common/base/Predicates.java

       * Returns a predicate that evaluates to {@code true} if any one of its components evaluates to
       * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited"
       * as soon as a true predicate is found. It defensively copies the iterable passed in, so future
       * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the
       * returned predicate will always evaluate to {@code false}.
       *
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 26.6K bytes
    - Click Count (0)
  3. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 5.6K bytes
    - Click Count (0)
  4. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 7.1K bytes
    - Click Count (0)
  5. api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java

         * where the property value is defined.
         */
        enum Source {
            /**
             * Maven system properties. These properties are evaluated very early during the boot process,
             * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Thu Jul 03 14:18:26 GMT 2025
    - 4.3K bytes
    - Click Count (0)
  6. fess-crawler/src/main/java/org/codelibs/fess/crawler/rule/Rule.java

     */
    public interface Rule extends Serializable {
    
        /**
         * Determines if the given response data matches the rule.
         *
         * @param responseData the response data to be evaluated
         * @return true if the response data matches the rule, false otherwise
         */
        boolean match(ResponseData responseData);
    
        /**
         * Retrieves the unique identifier for the rule.
         *
    Created: Sat Dec 20 11:21:39 GMT 2025
    - Last Modified: Sat Mar 15 06:52:00 GMT 2025
    - 1.7K bytes
    - Click Count (0)
  7. docs/batch-jobs/README.md

    ## Batch Jobs Terminology
    
    ### Job
    A job is the basic unit of work for MinIO Batch Job. A job is a self describing YAML, once this YAML is submitted and evaluated - MinIO performs the requested actions on each of the objects obtained under the described criteria in job YAML file.
    
    ### Type
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Thu Oct 06 06:00:43 GMT 2022
    - 4.8K bytes
    - Click Count (0)
  8. src/cmd/asm/internal/asm/expr_test.go

    	for i, test := range exprTests {
    		p.start(lex.Tokenize(test.input))
    		result := int64(p.expr())
    		if result != test.output {
    			t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output)
    		}
    		tok := p.next()
    		if test.atEOF && tok.ScanToken != scanner.EOF {
    			t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Tue Aug 29 07:48:38 GMT 2023
    - 3.2K bytes
    - Click Count (0)
  9. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 8.8K bytes
    - Click Count (0)
  10. src/main/java/org/codelibs/fess/helper/CrawlerStatsHelper.java

            CHILD_URL,
            /** Indicates that multiple child URLs were discovered. */
            CHILD_URLS,
            /** Indicates that a URL was evaluated for crawling eligibility. */
            EVALUATED,
            /** Indicates that a general exception occurred during processing. */
            EXCEPTION,
            /** Indicates that processing of a URL has finished. */
            FINISHED,
    Created: Sat Dec 20 09:19:18 GMT 2025
    - Last Modified: Thu Aug 07 03:06:29 GMT 2025
    - 17.4K bytes
    - Click Count (0)
Back to Top