Search Options

Results per page
Sort
Preferred Languages
Advance

Results 141 - 150 of 278 for Reimplement (0.05 sec)

  1. guava/src/com/google/common/util/concurrent/AbstractScheduledService.java

    import java.util.logging.Level;
    import org.jspecify.annotations.Nullable;
    
    /**
     * Base class for services that can implement {@link #startUp} and {@link #shutDown} but while in
     * the "running" state need to perform a periodic task. Subclasses can implement {@link #startUp},
     * {@link #shutDown} and also a {@link #runOneIteration} method that will be executed periodically.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 27.8K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/util/concurrent/Service.java

     * states it cannot ever leave them.
     *
     * <p>Implementors of this interface are strongly encouraged to extend one of the abstract classes
     * in this package which implement this interface and make the threading and state management
     * easier.
     *
     * @author Jesse Wilson
     * @author Luke Sandberg
     * @since 9.0 (in 1.0 as {@code com.google.common.base.Service})
     */
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 10.8K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/simple-oauth2.md

    You will get an "Inactive user" error, like:
    
    ```JSON
    {
      "detail": "Inactive user"
    }
    ```
    
    ## Recap { #recap }
    
    You now have the tools to implement a complete security system based on `username` and `password` for your API.
    
    Using these tools, you can make the security system compatible with any database and with any user or data model.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  4. SECURITY.md

    unauthorized access to data or models, but also to prevent malicious users or
    tenants sending graphs to execute under another tenant’s identity.
    
    The isolation mechanisms are the responsibility of the users to design and
    implement, and therefore security issues deriving from their absence are not
    considered a vulnerability in TensorFlow.
    
    ### Resource allocation
    
    A denial of service caused by one model could bring down the entire server, but
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. src/test/java/jcifs/internal/fscc/FileFsFullSizeInformationTest.java

        class InterfaceImplementationTests {
    
            @Test
            @DisplayName("Should implement AllocInfo interface")
            void shouldImplementAllocInfo() {
                assertTrue(AllocInfo.class.isAssignableFrom(FileFsFullSizeInformation.class));
            }
    
            @Test
            @DisplayName("Should implement FileSystemInformation interface")
            void shouldImplementFileSystemInformation() {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 30.5K bytes
    - Viewed (0)
  6. src/test/java/jcifs/internal/smb2/tree/Smb2TreeDisconnectRequestTest.java

            int cmd2 = (int) commandField.get(req2);
    
            assertEquals(cmd1, cmd2);
            assertEquals(SMB2_TREE_DISCONNECT, cmd1);
        }
    
        @Test
        @DisplayName("Should properly implement wire format protocol")
        void testWireFormatProtocol() {
            // Given
            Configuration mockConfig = mock(Configuration.class);
            Smb2TreeDisconnectRequest request = new Smb2TreeDisconnectRequest(mockConfig);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 14.1K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/util/concurrent/FuturesGetChecked.java

    import java.util.concurrent.Future;
    import java.util.concurrent.TimeUnit;
    import java.util.concurrent.TimeoutException;
    import org.jspecify.annotations.Nullable;
    
    /** Static methods used to implement {@link Futures#getChecked(Future, Class)}. */
    @J2ktIncompatible
    @GwtIncompatible
    final class FuturesGetChecked {
      @CanIgnoreReturnValue
      @ParametricNullness
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 10.2K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/job/ExecJob.java

     * This class provides common functionality for job execution including process management,
     * logging configuration, JVM options, and timeout handling.
     *
     * <p>Subclasses must implement the abstract methods to define specific job behavior
     * and execution type identification.</p>
     *
     * @version 1.0
     */
    public abstract class ExecJob {
    
        /** Logger instance for this class */
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  9. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/idn/Punycode.kt

     *
     * This class contains a Kotlin implementation of the pseudocode specified by RFC 3492. It includes
     * direct translation of the pseudocode presented there.
     *
     * Partner this class with [UTS #46] to implement IDNA2008 [RFC 5890] like most browsers do.
     *
     * [RFC 3492]: https://datatracker.ietf.org/doc/html/rfc3492
     * [RFC 5890]: https://datatracker.ietf.org/doc/html/rfc5890
     * [UTS #46]: https://www.unicode.org/reports/tr46/
     */
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top