Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 141 - 150 of 262 for alrgorithm (0.09 seconds)

  1. android/guava/src/com/google/common/math/IntMath.java

          return b;
        } else if (b == 0) {
          return a; // similar logic
        }
        /*
         * Uses the binary GCD algorithm; see http://en.wikipedia.org/wiki/Binary_GCD_algorithm. This is
         * >40% faster than the Euclidean algorithm in benchmarks.
         */
        int aTwos = Integer.numberOfTrailingZeros(a);
        a >>= aTwos; // divide out all 2s
        int bTwos = Integer.numberOfTrailingZeros(b);
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Jan 29 22:14:05 GMT 2026
    - 26.1K bytes
    - Click Count (0)
  2. lib/fips140/v1.26.0.zip

    internal function that records the use of an approved // service. It does not override RecordNonApproved calls in the same span. // // It should be called by exposed functions that perform a whole cryptographic // alrgorithm (e.g. by Sum, not by New, unless a cryptographic Instantiate // algorithm is performed) and should be called after any checks that may cause // the function to error out or panic. func RecordApproved() { if getIndicator() == indicatorUnset { setIndicator(indicatorTrue) } } // RecordNonApproved...
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Jan 08 17:58:32 GMT 2026
    - 660.3K bytes
    - Click Count (0)
  3. android/guava/src/com/google/common/hash/AbstractNonStreamingHashFunction.java

    import com.google.errorprone.annotations.Immutable;
    import java.nio.ByteBuffer;
    import java.nio.ByteOrder;
    import java.nio.charset.Charset;
    
    /**
     * Skeleton implementation of {@link HashFunction}, appropriate for non-streaming algorithms. All
     * the hash computation done using {@linkplain #newHasher()} are delegated to the {@linkplain
     * #hashBytes(byte[], int, int)} method.
     *
     * @author Dimitris Andreou
     */
    @Immutable
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Dec 04 15:39:10 GMT 2025
    - 4.8K bytes
    - Click Count (0)
  4. CITATION.cff

    architecture gives flexibility to the application developer, whereas in previous “parameter server” designs the management of shared state is built into the system, TensorFlow enables developers to experiment with novel optimizations and training algorithms. TensorFlow supports a variety of applications, with a focus on training and inference on deep neural networks. Several Google services use TensorFlow in production, we have released it as an open-source project, and it has become widely used for...
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Mon Sep 06 15:26:23 GMT 2021
    - 3.5K bytes
    - Click Count (0)
  5. cmd/storage-errors.go

    var errFileCorrupt = StorageErr("file is corrupted")
    
    // errBitrotHashAlgoInvalid - the algo for bit-rot hash
    // verification is empty or invalid.
    var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid")
    
    // errCrossDeviceLink - rename across devices not allowed.
    var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 6.4K bytes
    - Click Count (0)
  6. android/guava/src/com/google/common/hash/Fingerprint2011.java

    import com.google.common.annotations.VisibleForTesting;
    
    /**
     * Implementation of Geoff Pike's fingerprint2011 hash function. See {@link Hashing#fingerprint2011}
     * for information on the behaviour of the algorithm.
     *
     * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to
     * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Aug 11 19:31:30 GMT 2025
    - 6.5K bytes
    - Click Count (0)
  7. compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java

            Model child = getModel(baseName + "-child");
    
            if (fromRepo) {
                // when model is read from repo, a stream is used, then pomFile == null
                // (has consequences in inheritance algorithm since getProjectDirectory() returns null)
                parent = parent.clone();
                parent.setPomFile(null);
                child = child.clone();
                child.setPomFile(null);
            }
    
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Sep 17 10:01:14 GMT 2025
    - 8.2K bytes
    - Click Count (0)
  8. cmd/sts-handlers_test.go

            "claims": {
                "accessKey": "u4ccRswj62HV3Ifwima7",
                "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "ldapUsername": "svc.algorithm",
                "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "sa-policy": "inherited-policy"
            },
            "sessionPolicy": null,
            "status": "on",
            "name": "",
            "description": ""
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Oct 15 17:00:45 GMT 2025
    - 103.4K bytes
    - Click Count (1)
  9. src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java

            assertEquals(des, provider.providePrimaryInvertibleCryptographer());
            assertEquals(oneWayCryptographer, provider.providePrimaryOneWayCryptographer());
        }
    
        // Test with different hash algorithms
        @Test
        public void test_withSha512Cryptographer() {
            // Test with SHA512
            OneWayCryptographer sha512 = OneWayCryptographer.createSha512Cryptographer();
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Mar 13 23:01:26 GMT 2026
    - 13.2K bytes
    - Click Count (0)
  10. android/guava/src/com/google/common/math/BigIntegerMath.java

         * and the arithmetic mean is always higher than the geometric mean.
         *
         * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles
         * with each iteration, so this algorithm takes O(log(digits)) iterations.
         *
         * We start out with a double-precision approximation, which may be higher or lower than the
         * true value. Therefore, we perform at least one Newton iteration to get a guess that's
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 18.8K bytes
    - Click Count (0)
Back to Top