- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 163 for evaluated (0.06 seconds)
-
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java
super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause); this.expression = expression; this.originalMessage = message; } public ModelInterpolationException(String expression, String message) { super("The POM expression: " + expression + " could not be evaluated. Reason: " + message); this.expression = expression;
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Fri Oct 25 12:31:46 GMT 2024 - 1.9K bytes - Click Count (0) -
guava/src/com/google/common/base/Predicates.java
* Returns a predicate that evaluates to {@code true} if any one of its components evaluates to * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited" * as soon as a true predicate is found. It defensively copies the iterable passed in, so future * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the * returned predicate will always evaluate to {@code false}. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Mar 08 16:16:42 GMT 2026 - 26.6K bytes - Click Count (0) -
android/guava/src/com/google/common/base/Predicates.java
* Returns a predicate that evaluates to {@code true} if any one of its components evaluates to * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited" * as soon as a true predicate is found. It defensively copies the iterable passed in, so future * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the * returned predicate will always evaluate to {@code false}. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Mar 08 16:16:42 GMT 2026 - 26.6K bytes - Click Count (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 5.6K bytes - Click Count (0) -
api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java
* where the property value is defined. */ enum Source { /** * Maven system properties. These properties are evaluated very early during the boot process, * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Thu Jul 03 14:18:26 GMT 2025 - 4.3K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
src/cmd/asm/internal/asm/expr_test.go
for i, test := range exprTests { p.start(lex.Tokenize(test.input)) result := int64(p.expr()) if result != test.output { t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output) } tok := p.next() if test.atEOF && tok.ScanToken != scanner.EOF { t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Aug 29 07:48:38 GMT 2023 - 3.2K bytes - Click Count (0) -
ci/official/utilities/setup.sh
# Assumes variables will resolve themselves correctly. set +u for env_file in ${TFCI//,/ }; do source "./ci/official/envs/$env_file" done set -u echo '==TFCI==: Evaluated the following TFCI variables from $TFCI:' export -p | grep TFCI # Load those stored pre-existing TFCI_ vars, if any if [[ -s "$FROM_ENV" ]]; thenCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Thu Jan 09 18:37:25 GMT 2025 - 6.2K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0) -
android/guava/src/com/google/common/base/Splitter.java
return new Splitter(strategy, omitEmptyStrings, trimmer, limit); } /** * Splits {@code sequence} into string components and makes them available through an {@link * Iterator}, which may be lazily evaluated. If you want an eagerly computed {@link List}, use * {@link #splitToList(CharSequence)}. * * @param sequence the sequence of characters to split * @return an iteration over the segments split from the parameter
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Feb 23 19:19:10 GMT 2026 - 23.8K bytes - Click Count (0)