- Sort Score
- Result 10 results
- Languages All
Results 151 - 160 of 245 for algorithms (0.73 sec)
-
docs/debugging/hash-set/main.go
"encoding/binary" "flag" "fmt" "hash/crc32" "log" "os" "strings" "github.com/dchest/siphash" "github.com/google/uuid" ) // hashes the key returning an integer based on the input algorithm. // This function currently supports // - SIPMOD func sipHashMod(key string, cardinality int, id [16]byte) int { if cardinality <= 0 { return -1 } // use the faster version as per siphash docs
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Sep 19 18:05:16 UTC 2022 - 3.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
} /** * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}. * * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that theRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22.6K bytes - Viewed (0) -
internal/lsync/lrwmutex.go
const ( lockRetryInterval = 50 * time.Millisecond ) // lockLoop will acquire either a read or a write lock // // The call will block until the lock is granted using a built-in // timing randomized back-off algorithm to try again until successful func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) { r := rand.New(rand.NewSource(time.Now().UnixNano()))
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jan 02 17:15:06 UTC 2022 - 4.8K bytes - Viewed (0) -
maven-tests/mvnw.cmd
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Thu Sep 25 18:22:49 UTC 2025 - 6.8K bytes - Viewed (0) -
docs/erasure/README.md
## What is Erasure Code?
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 4.2K bytes - Viewed (0) -
cmd/sts-handlers_test.go
"claims": { "accessKey": "u4ccRswj62HV3Ifwima7", "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "ldapUsername": "svc.algorithm", "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "sa-policy": "inherited-policy" }, "sessionPolicy": null, "status": "on", "name": "", "description": ""
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 103.4K bytes - Viewed (1) -
docs/compression/README.md
MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2) streaming compression due to its stability and performance. This algorithm is specifically optimized for machine generated content. Write throughput is typically at least 500MB/s per CPU core, and scales with the number of available CPU cores. Decompression speed is typically at least 1GB/s.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 5.2K bytes - Viewed (0) -
guava/src/com/google/common/hash/Crc32cHashFunction.java
} @Override public String toString() { return "Hashing.crc32c()"; } static final class Crc32cHasher extends AbstractStreamingHasher { /* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Dec 28 01:26:26 UTC 2024 - 21.2K bytes - Viewed (0) -
docs/debugging/s3-check-md5/main.go
continue } if object.IsDeleteMarker { log.Println("SKIPPED: DELETE marker object:", objFullPath(object)) continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 6.3K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
} /** * Test decrypt with DES encryption. * * @throws GeneralSecurityException if a security error occurs * @throws NoSuchAlgorithmException if the algorithm is not available */ @Test void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException { KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0)