- Sort Score
- Result 10 results
- Languages All
Results 141 - 150 of 249 for efficient (0.56 sec)
-
src/main/java/jcifs/smb1/smb1/BufferCache.java
private static final java.util.concurrent.ConcurrentLinkedQueue<byte[]> bufferQueue = new java.util.concurrent.ConcurrentLinkedQueue<>(); // Track queue size with atomic counter for efficiency private static final java.util.concurrent.atomic.AtomicInteger queueSize = new java.util.concurrent.atomic.AtomicInteger(0); /** * Gets a buffer from the cache or creates a new one if the cache is empty.
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 4.2K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/services/BuilderProblem.java
/** * Gets the hint about the source of the problem. While the syntax of this hint is unspecified and depends on the * creator of the problem, the general expectation is that the hint provides sufficient information to the user to * track the problem back to its origin. A concrete example for such a source hint can be the file path or URL from * which the settings were read. *Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Thu Mar 23 05:29:39 UTC 2023 - 3.6K bytes - Viewed (0) -
internal/http/dial_linux.go
Control: setTCPParametersFn(opts), } conn, err := dialer.DialContext(ctx, network, addr) if err != nil { return nil, err } if opts.DriveOPTimeout != nil { // Read deadlines are sufficient for now as per various // scenarios of hung node detection, we may add Write deadlines // if needed later on. return deadlineconn.New(conn).WithReadDeadline(opts.DriveOPTimeout()), nil } return conn, nil
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Jul 23 10:53:03 UTC 2024 - 5K bytes - Viewed (0) -
src/test/java/jcifs/smb1/util/MimeMapTest.java
} } @Nested @DisplayName("Performance and concurrency") class PerformanceTests { @Test @DisplayName("Should handle multiple lookups efficiently") void testMultipleLookups() throws IOException { // Test that multiple lookups work correctly for (int i = 0; i < 100; i++) {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/Collections2Test.java
.size()); // Almost force an overflow in the binomial coefficient calculation assertEquals( 1391975640 /*C(34,14)*/, Collections2.orderedPermutations(concat(nCopies(20, 1), nCopies(14, 2))).size()); // Do force an overflow in the binomial coefficient calculation assertEquals( Integer.MAX_VALUE,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 20.1K bytes - Viewed (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/building/ModelProblem.java
} /** * Gets the hint about the source of the problem. While the syntax of this hint is unspecified and depends on the * creator of the problem, the general expectation is that the hint provides sufficient information to the user to * track the problem back to its origin. A concrete example for such a source hint can be the file path or URL from * which a POM was read. *Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Tue Feb 25 08:27:34 UTC 2025 - 4K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/create/CreateContextRequestTest.java
} } } @Nested @DisplayName("Performance Tests") class PerformanceTests { @Test @DisplayName("Should handle repeated encoding efficiently") void testRepeatedEncoding() { TestCreateContextRequest request = new TestCreateContextRequest("PERFORMANCE".getBytes(StandardCharsets.UTF_8)); byte[] buffer = new byte[256];Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 24.9K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt
Program, it is Recipient's responsibility to acquire that license before distributing the Program. d) Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant the copyright license set forth in this Agreement. e) Notwithstanding the terms of any Secondary License, no
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Tue Jun 04 06:45:16 UTC 2024 - 13.9K bytes - Viewed (0) -
docs/features/events.md
* The performance of these calls on the underlying network. If the network’s performance isn’t sufficient, you need to either improve the network or use less of it. ### EventListener
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 7.7K bytes - Viewed (0) -
docs/sts/wso2.md
1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0)