- Sort Score
- Result 10 results
- Languages All
Results 1101 - 1110 of 1,563 for examples (0.07 sec)
-
android/guava/src/com/google/common/primitives/UnsignedInts.java
max = next; } } return flip(max); } /** * Returns a string containing the supplied unsigned {@code int} values separated by {@code * separator}. For example, {@code join("-", 1, 2, 3)} returns the string {@code "1-2-3"}. * * @param separator the text that should appear between consecutive values in the resulting string * (but not at the start or end)
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 21:17:54 UTC 2024 - 13.7K bytes - Viewed (0) -
guava/src/com/google/common/primitives/UnsignedInts.java
max = next; } } return flip(max); } /** * Returns a string containing the supplied unsigned {@code int} values separated by {@code * separator}. For example, {@code join("-", 1, 2, 3)} returns the string {@code "1-2-3"}. * * @param separator the text that should appear between consecutive values in the resulting string * (but not at the start or end)
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 21:17:54 UTC 2024 - 13.7K bytes - Viewed (0) -
docs/pt/docs/advanced/advanced-dependencies.md
```Python hl_lines="20" {!> ../../docs_src/dependencies/tutorial011.py!} ``` //// /// tip | "Dica" Tudo isso parece não ser natural. E pode não estar muito claro ou aparentar ser útil ainda. Estes exemplos são intencionalmente simples, porém mostram como tudo funciona. Nos capítulos sobre segurança, existem funções utilitárias que são implementadas desta maneira.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 4.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableCollection.java
* access, and lastly speed of creation. * <li>The {@code copyOf} methods will sometimes recognize that the actual copy operation is * unnecessary; for example, {@code copyOf(copyOf(anArrayList))} should copy the data only * once. This reduces the expense of habitually making defensive copies at API boundaries.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Aug 12 16:59:15 UTC 2024 - 18.8K bytes - Viewed (0) -
compat/maven-model-builder/src/test/java/org/apache/maven/model/validation/DefaultModelValidatorTest.java
assertViolations(result, 1, 0, 0); assertEquals( "'dependencies.dependency[com.example.group:testinvalidpom:0.0.1-SNAPSHOT]' for com.example.group:testinvalidpom:0.0.1-SNAPSHOT is referencing itself.", result.getFatals().get(0)); } @Test
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 32.8K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/MultimapsCollectionTest.java
} } abstract static class TestEntriesGenerator implements TestCollectionGenerator<Entry<String, Integer>> { @Override public SampleElements<Entry<String, Integer>> samples() { return new SampleElements<>( immutableEntry("bar", 1), immutableEntry("bar", 2), immutableEntry("foo", 3), immutableEntry("bar", 3),
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 28.9K bytes - Viewed (0) -
guava/src/com/google/common/base/Utf8.java
/** * Returns {@code true} if {@code bytes} is a <i>well-formed</i> UTF-8 byte sequence according to * Unicode 6.0. Note that this is a stronger criterion than simply whether the bytes can be * decoded. For example, some versions of the JDK decoder will accept "non-shortest form" byte * sequences, but encoding never reproduces these. Such byte sequences are <i>not</i> considered * well-formed. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <tt>WNET\alice</tt> tries to open a file * with desired access bits <tt>0x00000003</tt> (<tt>FILE_READ_DATA | * FILE_WRITE_DATA</tt>) and the target file has the following security * descriptor ACEs: * * <pre>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0) -
common-protos/k8s.io/api/networking/v1alpha1/generated.proto
// perNodeHostBits defines the number of host bits to be configured per node. // A subnet mask determines how much of the address is used for network bits // and host bits. For example an IPv4 address of 192.168.0.0/24, splits the // address into 24 bits for the network portion and 8 bits for the host portion. // To allocate 256 IPs, set this field to 8 (a /24 mask for IPv4 or a /120 for IPv6).
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 6K bytes - Viewed (0) -
docs/features/connections.md
There may be many routes for a single address. For example, a webserver that is hosted in multiple datacenters may yield multiple IP addresses in its DNS response. In limited situations OkHttp will retry a route if connecting fails:
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Feb 21 03:33:59 UTC 2022 - 5.4K bytes - Viewed (0)