Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 3,967 for that (0.14 sec)

  1. android/guava/src/com/google/common/collect/Multiset.java

    /**
     * A collection that supports order-independent equality, like {@link Set}, but may have duplicate
     * elements. A multiset is also sometimes called a <i>bag</i>.
     *
     * <p>Elements of a multiset that are equal to one another are referred to as <i>occurrences</i> of
     * the same single element. The total number of occurrences of an element in a multiset is called
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Sat Jun 17 14:40:53 GMT 2023
    - 19.7K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/flowcontrol/v1beta1/generated.proto

      //
      // The value of this field can be more than 100, implying that this
      // priority level can borrow a number of seats that is greater than
      // its own nominal concurrency limit (NominalCL).
      // When this field is left `nil`, the limit is effectively infinite.
      // +optional
      optional int32 borrowingLimitPercent = 4;
    }
    
    // NonResourcePolicyRule is a predicate that matches non-resource requests according to their verb and the
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 19.4K bytes
    - Viewed (0)
  3. guava/src/com/google/common/base/Converter.java

     * want their output to be non-null in operations like `stream.map(myConverter)`, and we can
     * guarantee that as long as we also require the input type to be non-null[*] (which is a
     * requirement that existing callers already fulfill).
     *
     * Disclaimer: Part of the reason that callers are so well adapted to `Function<A, B>` may be that
     * that is how the signature looked even prior to this comment! So naturally any change can break
    Java
    - Registered: Fri Apr 05 12:43:09 GMT 2024
    - Last Modified: Thu Feb 15 16:12:13 GMT 2024
    - 23K bytes
    - Viewed (1)
  4. android/guava/src/com/google/common/net/HostSpecifier.java

     * recognized public suffix; see {@link InternetDomainName#isPublicSuffix()} for details.
     *
     * <p>Note that no network lookups are performed by any {@code HostSpecifier} methods. No attempt is
     * made to verify that a provided specifier corresponds to a real or accessible host. Only syntactic
     * and pattern-based checks are performed.
     *
     * <p>If you know that a given string represents a numeric IP address, use {@link InetAddresses} to
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Wed Apr 05 09:18:40 GMT 2023
    - 6K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/flowcontrol/v1beta3/generated.proto

      //
      // The value of this field can be more than 100, implying that this
      // priority level can borrow a number of seats that is greater than
      // its own nominal concurrency limit (NominalCL).
      // When this field is left `nil`, the limit is effectively infinite.
      // +optional
      optional int32 borrowingLimitPercent = 4;
    }
    
    // NonResourcePolicyRule is a predicate that matches non-resource requests according to their verb and the
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 19.5K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/primitives/Doubles.java

            return true;
          }
          if (object instanceof DoubleArrayAsList) {
            DoubleArrayAsList that = (DoubleArrayAsList) object;
            int size = size();
            if (that.size() != size) {
              return false;
            }
            for (int i = 0; i < size; i++) {
              if (array[start + i] != that.array[that.start + i]) {
                return false;
              }
            }
            return true;
          }
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Thu Feb 29 15:43:06 GMT 2024
    - 27.1K bytes
    - Viewed (0)
  7. CONTRIBUTING.md

    For any non-trivial change, we need to be able to answer these questions:
    
    * Why is this change done? What's the use case?
    * For user facing features, what will the API look like?
    * What test cases should it have? What could go wrong?
    * How will it roughly be implemented? We'll happily provide code pointers to save you time.
    
    Plain Text
    - Registered: Wed May 08 11:36:15 GMT 2024
    - Last Modified: Sat May 04 07:43:02 GMT 2024
    - 15.6K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/core/v1/generated.proto

      // The scheduler will prefer to schedule pods to nodes that satisfy
      // the affinity expressions specified by this field, but it may choose
      // a node that violates one or more of the expressions. The node that is
      // most preferred is the one with the greatest sum of weights, i.e.
      // for each node that meets all of the scheduling requirements (resource
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 255.8K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/ImmutableSortedSet.java

       *
       * <p><b>Note:</b> Despite what the method name suggests, if {@code elements} is an {@code
       * ImmutableSortedSet}, it may be returned instead of a copy.
       *
       * <p>This method is not type-safe, as it may be called on elements that are not mutually
       * comparable.
       *
       * <p>This method is safe to use even when {@code elements} is a synchronized or concurrent
       * collection that is currently being modified by another thread.
    Java
    - Registered: Fri Apr 05 12:43:09 GMT 2024
    - Last Modified: Mon Apr 01 16:15:01 GMT 2024
    - 38.5K bytes
    - Viewed (0)
  10. SECURITY.md

    available to TensorFlow is powerful enough that you should assume that the
    TensorFlow process effectively executes arbitrary code.
    
    The risk of loading untrusted checkpoints depends on the code or graph that you
    are working with. When loading untrusted checkpoints, the values of the traced
    variables from your model are also going to be untrusted. That means that if
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top