- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 209 for Algorithm (0.06 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
impl/maven-core/src/main/java/org/apache/maven/lifecycle/internal/builder/multithreaded/SmartProjectComparator.java
/** * Smart project comparator that orders projects based on critical path analysis. * Projects with longer downstream dependency chains are prioritized to maximize * parallel execution efficiency. * * <p>The algorithm calculates a weight for each project as: * weight = 1 + max(downstream_project_weights) * * <p>Projects are then sorted by weight in descending order, ensuring that
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Aug 06 12:03:40 GMT 2025 - 4.6K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/Collections2.java
} /** * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}. * * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that theCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 22.6K bytes - Click Count (0) -
internal/hash/checksum_test.go
chksm.Type |= ChecksumFullObject } // Prepare the checksum map with appropriate headers m := chksm.AsMap() m[xhttp.AmzChecksumAlgo] = chksm.Type.String() // Set the algorithm explicitly if chksm.Type.FullObjectRequested() { m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeFullObject } else { m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeComposite }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 22 14:15:21 GMT 2025 - 7.1K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Crc32cHashFunction.java
} @Override public String toString() { return "Hashing.crc32c()"; } static final class Crc32cHasher extends AbstractStreamingHasher { /* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows,
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Dec 28 01:26:26 GMT 2024 - 21.2K bytes - Click Count (0) -
internal/lsync/lrwmutex.go
const ( lockRetryInterval = 50 * time.Millisecond ) // lockLoop will acquire either a read or a write lock // // The call will block until the lock is granted using a built-in // timing randomized back-off algorithm to try again until successful func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) { r := rand.New(rand.NewSource(time.Now().UnixNano()))
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Jan 02 17:15:06 GMT 2022 - 4.8K bytes - Click Count (0) -
docs/debugging/s3-check-md5/main.go
continue } if object.IsDeleteMarker { log.Println("SKIPPED: DELETE marker object:", objFullPath(object)) continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 6.3K bytes - Click Count (0) -
docs/compression/README.md
MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2) streaming compression due to its stability and performance. This algorithm is specifically optimized for machine generated content. Write throughput is typically at least 500MB/s per CPU core, and scales with the number of available CPU cores. Decompression speed is typically at least 1GB/s.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 5.2K bytes - Click Count (0) -
src/test/java/jcifs/ACETest.java
verify(ace).getApplyToText(); } } @Nested @DisplayName("Windows Access Check Algorithm Tests") class WindowsAccessCheckTests { @Test @DisplayName("Should simulate access check algorithm from documentation") void shouldSimulateDocumentationExample() {
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 24.4K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
} /** * Test decrypt with DES encryption. * * @throws GeneralSecurityException if a security error occurs * @throws NoSuchAlgorithmException if the algorithm is not available */ @Test void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException { KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56);Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 7.7K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Fingerprint2011.java
import com.google.common.annotations.VisibleForTesting; /** * Implementation of Geoff Pike's fingerprint2011 hash function. See {@link Hashing#fingerprint2011} * for information on the behaviour of the algorithm. * * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Aug 11 19:31:30 GMT 2025 - 6.5K bytes - Click Count (0)