Search Options

Results per page
Sort
Preferred Languages
Advance

Results 141 - 150 of 344 for Reverse (0.09 sec)

  1. compat/maven-embedder/src/main/java/org/apache/maven/cli/MavenCli.java

                    }
                }
    
                return extRealm;
            }
    
            return coreRealm;
        }
    
        private static <T> List<T> reverse(List<T> list) {
            List<T> copy = new ArrayList<>(list);
            Collections.reverse(copy);
            return copy;
        }
    
        private List<File> parseExtClasspath(CliRequest cliRequest) {
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 76.8K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/ImmutableSortedMap.java

      }
    
      /**
       * Returns a builder that creates immutable sorted maps whose keys are ordered by the reverse of
       * their natural ordering.
       */
      public static <K extends Comparable<?>, V> Builder<K, V> reverseOrder() {
        return new Builder<>(Ordering.<K>natural().reverse());
      }
    
      /**
       * A builder for creating immutable sorted map instances, especially {@code public static final}
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 53K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
     *       code, or even to discover <i>any</i> two distinct inputs that yield the same result. These
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
     *       code, or even to discover <i>any</i> two distinct inputs that yield the same result. These
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb/Kerb5Authenticator.java

                // use a KDC of our choice.
                // A potential workaround would be to try to get the server FQDN by reverse lookup, but this might have
                // security implications and also is not how Microsoft does it.
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 13K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/TopKSelector.java

       */
      public static <T extends @Nullable Object> TopKSelector<T> greatest(
          int k, Comparator<? super T> comparator) {
        return new TopKSelector<>(Ordering.from(comparator).reverse(), k);
      }
    
      private final int k;
      private final Comparator<? super T> comparator;
    
      /*
       * We are currently considering the elements in buffer in the range [0, bufferSize) as candidates
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/Table.java

     * possessing a corresponding value.
     *
     * <p>The mappings corresponding to a given row key may be viewed as a {@link Map} whose keys are
     * the columns. The reverse is also available, associating a column with a row key / value map. Note
     * that, in some implementations, data access by column key may have fewer supported operations or
     * worse performance than data access by row key.
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Jun 17 14:40:53 UTC 2023
    - 10.7K bytes
    - Viewed (0)
  8. cmd/update.go

    // `RELEASE.2017-09-29T19-16-56Z`
    func releaseTimeToReleaseTag(releaseTime time.Time) string {
    	return "RELEASE." + releaseTime.Format(MinioReleaseTagTimeLayout)
    }
    
    // releaseTagToReleaseTime - reverse of `releaseTimeToReleaseTag()`
    func releaseTagToReleaseTime(releaseTag string) (releaseTime time.Time, err error) {
    	fields := strings.Split(releaseTag, ".")
    	if len(fields) < 2 || len(fields) > 4 {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 18.7K bytes
    - Viewed (0)
  9. src/builtin/builtin.go

    // invocation of F then behaves like a call to panic, terminating G's
    // execution and running any deferred functions. This continues until all
    // functions in the executing goroutine have stopped, in reverse order. At
    // that point, the program is terminated with a non-zero exit code. This
    // termination sequence is called panicking and can be controlled by the
    // built-in function recover.
    //
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Thu Apr 11 20:22:45 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  10. android/guava-tests/benchmark/com/google/common/util/concurrent/ExecutionListBenchmark.java

            } catch (RuntimeException e) {
              log.log(
                  Level.SEVERE,
                  "RuntimeException while executing runnable "
                      + runnable
                      + " with executor "
                      + executor,
                  e);
            }
          }
        }
      }
    
      // A version of the execution list that doesn't reverse the stack in execute().
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 22:10:29 UTC 2024
    - 20.5K bytes
    - Viewed (0)
Back to top