Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 101 for evaluated (0.14 sec)

  1. guava/src/com/google/common/base/Predicates.java

       * Returns a predicate that evaluates to {@code true} if any one of its components evaluates to
       * {@code true}. The components are evaluated in order, and evaluation will be "short-circuited"
       * as soon as a true predicate is found. It defensively copies the iterable passed in, so future
       * changes to it won't alter the behavior of this predicate. If {@code components} is empty, the
       * returned predicate will always evaluate to {@code false}.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  2. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  4. api/maven-api-annotations/src/main/java/org/apache/maven/api/annotations/Config.java

         * where the property value is defined.
         */
        enum Source {
            /**
             * Maven system properties. These properties are evaluated very early during the boot process,
             * typically set by Maven itself and flagged as readOnly=true or by users via maven-system.properties files.
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Thu Jul 03 14:18:26 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  5. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  6. src/cmd/asm/internal/asm/expr_test.go

    	for i, test := range exprTests {
    		p.start(lex.Tokenize(test.input))
    		result := int64(p.expr())
    		if result != test.output {
    			t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output)
    		}
    		tok := p.next()
    		if test.atEOF && tok.ScanToken != scanner.EOF {
    			t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 29 07:48:38 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  7. fess-crawler/src/main/java/org/codelibs/fess/crawler/rule/Rule.java

     */
    public interface Rule extends Serializable {
    
        /**
         * Determines if the given response data matches the rule.
         *
         * @param responseData the response data to be evaluated
         * @return true if the response data matches the rule, false otherwise
         */
        boolean match(ResponseData responseData);
    
        /**
         * Retrieves the unique identifier for the rule.
         *
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sat Mar 15 06:52:00 UTC 2025
    - 1.7K bytes
    - Viewed (0)
  8. docs/batch-jobs/README.md

    ## Batch Jobs Terminology
    
    ### Job
    A job is the basic unit of work for MinIO Batch Job. A job is a self describing YAML, once this YAML is submitted and evaluated - MinIO performs the requested actions on each of the objects obtained under the described criteria in job YAML file.
    
    ### Type
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Oct 06 06:00:43 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  9. src/main/java/org/codelibs/fess/crawler/transformer/FessTransformer.java

         * The template is evaluated using the specified script engine with the value and context.
         *
         * @param dataMap the data map to modify
         * @param key the key to store the processed value under
         * @param value the original value to process
         * @param template the template script to evaluate
         * @param scriptType the type of script engine to use
         */
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
Back to top