- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 347 for high (0.13 sec)
-
android/guava/src/com/google/common/hash/Murmur3_32HashFunction.java
return fmix(h1, Ints.BYTES); } @Override public HashCode hashLong(long input) { int low = (int) input; int high = (int) (input >>> 32); int k1 = mixK1(low); int h1 = mixH1(seed, k1); k1 = mixK1(high); h1 = mixH1(h1, k1); return fmix(h1, Longs.BYTES); } @Override public HashCode hashUnencodedChars(CharSequence input) {
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Wed Jun 15 20:59:00 GMT 2022 - 11.9K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/base/StringsTest.java
// Two differing invalid pairs. assertEquals("abc\uD8AB", Strings.commonPrefix("abc\uD8AB\uD8ABdef", "abc\uD8AB\uD8ACxyz")); // One orphan high surrogate. assertEquals("", Strings.commonPrefix("\uD8AB\uDCAB", "\uD8AB")); // Two orphan high surrogates. assertEquals("\uD8AB", Strings.commonPrefix("\uD8AB", "\uD8AB")); } public void testCommonSuffix() {
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Fri Feb 09 15:49:48 GMT 2024 - 10.3K bytes - Viewed (0) -
android/guava/src/com/google/common/escape/ArrayBasedUnicodeEscaper.java
// This approach does mean that we break out of the fast path code in cases // where we don't strictly need to, but this situation will almost never // occur in practice. if (safeMin >= Character.MIN_HIGH_SURROGATE) { // The safe range is empty or the all safe code points lie in or above the // surrogate range. Either way the character range is empty. this.safeMinChar = Character.MAX_VALUE;
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Oct 10 19:45:10 GMT 2022 - 8.5K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/internal/idn/StringprepTest.kt
* surrogates with '?', we can't test this behavior with Java Strings. Instead, pass the surrogate * code itself encoded as UTF-8 sequence. */ @Test fun prohibitionSurrogateCodes() { // UTF-8 encoding of the high surrogate U+D800. assertThat(stringPrep(Buffer().write("eda080".decodeHex()))).isNull() } @Test fun prohibitionInappropriateForPlainText() { assertThat(stringPrep("\ufff9")).isNull()
Plain Text - Registered: Fri Mar 29 11:42:11 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 4.7K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/MediaType.kt
* or response body. * * [rfc_2045]: http://tools.ietf.org/html/rfc2045 */ class MediaType internal constructor( internal val mediaType: String, /** * Returns the high-level media type, such as "text", "image", "audio", "video", or "application". */ @get:JvmName("type") val type: String, /** * Returns a specific media subtype, such as "plain" or "png", "mpeg", "mp4" or "xml". */
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 4.2K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/guide/PostExample.java
.build(); try (Response response = client.newCall(request).execute()) { return response.body().string(); } } String bowlingJson(String player1, String player2) { return "{'winCondition':'HIGH_SCORE'," + "'name':'Bowling'," + "'round':4," + "'lastSaved':1367702411696," + "'dateStarted':1367702378785," + "'players':["
Java - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Fri Apr 05 03:30:42 GMT 2024 - 2K bytes - Viewed (0) -
internal/fips/api.go
// are implemented by a FIPS 140 certified cryptographic module. // // So, FIPS 140 requires that a certified implementation of e.g. AES // is used to implement more high-level cryptographic protocols. // It does not require any specific security criteria for those // high-level protocols. FIPS 140 focuses only on the implementation // and usage of the most low-level cryptographic building blocks. // // [1]: https://en.wikipedia.org/wiki/FIPS_140
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Dec 30 19:37:07 GMT 2022 - 5.1K bytes - Viewed (0) -
architecture/networking/pilot.md
# Architecture of Istiod This document describes the high level architecture of the Istio control plane, Istiod. Istiod is structured as a modular monolith, housing a wide range of functionality from certificate signing, proxy configuration (XDS), traditional Kubernetes controllers, and more. ## Proxy Configuration
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Feb 07 17:53:24 GMT 2024 - 19.1K bytes - Viewed (0) -
docs/en/data/sponsors.yml
title: Biosecurity risk assessments made easy. img: https://fastapi.tiangolo.com/img/sponsors/exoflare.png - url: https://testdriven.io/courses/tdd-fastapi/ title: Learn to build high-quality web apps with best practices
Others - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Mon Mar 25 23:10:11 GMT 2024 - 3.3K bytes - Viewed (0) -
internal/etag/reader.go
// returns ETag of the content. Otherwise, it returns // nil as ETag. // // Wrap provides an adapter for io.Reader implementations // that don't implement the Tagger interface. // It is mainly used to provide a high-level io.Reader // access to the ETag computed by a low-level io.Reader: // // content := etag.NewReader(r.Body, nil) // // compressedContent := Compress(content) // encryptedContent := Encrypt(compressedContent) //
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 4.8K bytes - Viewed (0)