- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 27 for perfectly (0.09 seconds)
-
architecture/standards/0008-use-nullaway.md
* One has to write NullAway-conformant code even when hacking. * Some patterns used to satisfy NullAway can be slightly more verbose.
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Dec 11 10:24:40 GMT 2025 - 4K bytes - Click Count (0) -
docs/en/docs/tutorial/security/index.md
* `implicit` * `clientCredentials` * `authorizationCode` * But there is one specific "flow" that can be perfectly used for handling authentication in the same application directly: * `password`: some next chapters will cover examples of this. * `openIdConnect`: has a way to define how to discover OAuth2 authentication data automatically.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 10:49:48 GMT 2025 - 4.4K bytes - Click Count (0) -
guava/src/com/google/common/math/PairedStatsAccumulator.java
* xStats().populationVariance() > 0.0 && yStats().populationVariance() > 0.0}). The result is not * guaranteed to be exactly +/-1 even when the data are perfectly (anti-)correlated, due to * numerical errors. However, it is guaranteed to be in the inclusive range [-1, +1]. * * <h3>Non-finite values</h3> *
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 08 18:35:13 GMT 2025 - 10.4K bytes - Click Count (0) -
guava/src/com/google/common/math/PairedStats.java
* xStats().populationVariance() > 0.0 && yStats().populationVariance() > 0.0}). The result is not * guaranteed to be exactly +/-1 even when the data are perfectly (anti-)correlated, due to * numerical errors. However, it is guaranteed to be in the inclusive range [-1, +1]. * * <h3>Non-finite values</h3> *
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 12.6K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash tableCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash tableCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
docs/en/docs/tutorial/bigger-applications.md
{* ../../docs_src/bigger_applications/app_an_py39/routers/items.py hl[3] title["app/routers/items.py"] *} #### How relative imports work { #how-relative-imports-work } /// tip If you know perfectly how imports work, continue to the next section below. /// A single dot `.`, like in: ```Python from .dependencies import get_token_header ``` would mean:Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 10 08:55:32 GMT 2025 - 18.6K bytes - Click Count (0) -
cmd/endpoint.go
// path on windows might become C:/C:/ this will cause problems // of starting minio server properly in distributed mode on windows. // As a special case make sure to trim the separator. // NOTE: It is also perfectly fine for windows users to have a path // without C:/ since at that point we treat it as relative path // and obtain the full filesystem path as well. Providing C:/ // style is necessary to provide paths other than C:/,
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 34.5K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
Do you think, at your age, it is right?' `In my youth,' Father William replied to his son, `I feared it might injure the brain; But, now that I'm perfectly sure I have none, Why, I do it again and again.' `You are old,' said the youth, `as I mentioned before, And have grown most uncommonly fat; Yet you turned a back-somersault in at the door--Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Apr 21 02:27:51 GMT 2017 - 145.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.21.md
- The feature gates `WindowsGMSA` and `WindowsRunAsUserName` that are GA since v1.18 are now...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Fri Oct 14 07:03:14 GMT 2022 - 367.3K bytes - Click Count (0)