- Sort Score
- Result 10 results
- Languages All
Results 1221 - 1230 of 1,427 for appends (0.21 sec)
-
guava/src/com/google/common/collect/LinkedHashMultimap.java
} /** * Constructs a {@code LinkedHashMultimap} with the same mappings as the specified multimap. If a * key-value mapping appears multiple times in the input multimap, it only appears once in the * constructed multimap. The new multimap has the same {@link Multimap#entries()} iteration order * as the input multimap, except for excluding duplicate mappings. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 22 21:19:52 UTC 2024 - 24.3K bytes - Viewed (0) -
cmd/object-handlers.go
w.Header().Set(xhttp.LastModified, lastModified) w.Header().Del(xhttp.ContentType) if _, ok := opts.ObjectAttributes[xhttp.Checksum]; ok { chkSums := objInfo.decryptChecksums(0, r.Header) // AWS does not appear to append part number on this API call. if len(chkSums) > 0 { OA.Checksum = &objectAttributesChecksum{ ChecksumCRC32: strings.Split(chkSums["CRC32"], "-")[0], ChecksumCRC32C: strings.Split(chkSums["CRC32C"], "-")[0],
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0) -
android/guava/src/com/google/common/net/UrlEscapers.java
* uppercase, hexadecimal representation of the byte value. * </ul> * * <p>This escaper is suitable for escaping parameter names and values even when <a * href="https://www.w3.org/TR/html401/appendix/notes.html#h-B.2.2">using the non-standard * semicolon</a>, rather than the ampersand, as a parameter delimiter. Nevertheless, we recommend * using the ampersand unless you must interoperate with systems that require semicolons.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jul 19 16:02:36 UTC 2024 - 7.1K bytes - Viewed (0) -
cmd/encryption-v1.go
ETag, err := etag.Parse(object.ETag) if err != nil { continue } if ETag.IsEncrypted() { SSES3SinglePartObjects[i] = true metadata = append(metadata, object.UserDefined) buckets = append(buckets, object.Bucket) names = append(names, object.Name) } } } // If there are no SSE-S3 single-part objects // we can skip the decryption process. However,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
src/main/webapp/WEB-INF/view/common/admin/sidebar.jsp
<input class="form-control form-control-sidebar" name="q" id="query" maxlength="1000" placeholder="<la:message key="labels.sidebar.placeholder_search" />"> <div class="input-group-append"> <button class="btn btn-sidebar" type="submit" name="search" id="search-btn"> <em class="fa fa-search"> </button> </div> </div> </form> </c:if> <nav class="mt-2">
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Apr 15 20:55:28 UTC 2021 - 17.8K bytes - Viewed (0) -
cmd/encryption-v1_test.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Sep 24 04:17:08 UTC 2022 - 19.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
) }, construct = { Validity( notBefore = it[0] as Long, notAfter = it[1] as Long, ) }, ) /** The type of the parameters depends on the algorithm that precedes it. */ private val algorithmParameters: DerAdapter<Any?> = Adapters.usingTypeHint { typeHint -> when (typeHint) {
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 13.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactLinkedHashSet.java
* elements, including {@code null}, are permitted. * * <p>{@code contains(x)}, {@code add(x)} and {@code remove(x)}, are all (expected and amortized) * constant time operations. Expected in the hashtable sense (depends on the hash function doing a * good job of distributing the elements to the buckets to a distribution not far from uniform), and * amortized since some operations can trigger a hash table resize. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 09 00:15:47 UTC 2024 - 9.7K bytes - Viewed (0) -
SECURITY.md
available to TensorFlow is powerful enough that you should assume that the TensorFlow process effectively executes arbitrary code. The risk of loading untrusted checkpoints depends on the code or graph that you are working with. When loading untrusted checkpoints, the values of the traced variables from your model are also going to be untrusted. That means that if
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
licenses/github.com/opencontainers/go-digest/LICENSE
Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Dec 16 22:26:43 UTC 2020 - 10.5K bytes - Viewed (0)