- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 217 for ongoing (0.15 sec)
-
compat/maven-artifact/src/main/java/org/apache/maven/artifact/versioning/ComparableVersion.java
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 26K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
If you have an API that does a comparable amount of computations every time and you have a lot of clients, then the **CPU utilization** will probably *also be stable* (instead of constantly going up and down quickly). ### Examples of Replication Tools and Strategies
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 17.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/netbios/NbtAddress.java
if( addr == null ) { /* This is almost exactly like InetAddress.java. See the * comments there for a description of how the LOOKUP_TABLE prevents * redundant queries from going out on the wire. */ if(( addr = (NbtAddress)checkLookupTable( name )) == null ) { try { addr = CLIENT.getByName( name, svr );
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 30.1K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableIntArray.java
// it doesn't escape this class @SuppressWarnings("Immutable") private final int[] array; /* * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most * instances. Note that the instances that would get smaller are the right set to care about * optimizing, because the rest have the option of calling `trimmed`. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 22.2K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashSet.java
* <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 20:24:49 UTC 2024 - 24.9K bytes - Viewed (0) -
tensorflow/c/c_api.h
// must be either listed in `inputs` or must come from another node in // the body. In particular, it is an error to have a control edge going from // a node outside of the body into a node in the body. This applies to control // edges going from nodes referenced in `inputs` to nodes in the body when // the former nodes are not in the body (automatically skipped or not // included in explicitly specified body).
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Thu Oct 26 21:08:15 UTC 2023 - 82.3K bytes - Viewed (0) -
android/guava/src/com/google/common/base/Converter.java
* methods as implementations of normal converters do? * * But no matter what we do, it's worth remembering that the resulting code is going to be unsound * in the presence of LegacyConverter, at least in the case of users who view the converter as a * Function<A, B> or who call convertAll (and for any checkers that apply @PolyNull-like semantics
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 15 16:12:13 UTC 2024 - 23K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableDoubleArray.java
// it doesn't escape this class @SuppressWarnings("Immutable") private final double[] array; /* * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most * instances. Note that the instances that would get smaller are the right set to care about * optimizing, because the rest have the option of calling `trimmed`. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 23K bytes - Viewed (0) -
cmd/server-main.go
err := buildServerCtxt(ctx, &globalServerCtxt) logger.FatalIf(err, "Unable to prepare the list of endpoints") serverHandleCmdArgs(globalServerCtxt) }) // DNS cache subsystem to reduce outgoing DNS requests runDNSCache(ctx) // Handle all server environment vars. serverHandleEnvVars() // Load the root credentials from the shell environment or from
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 21:50:11 UTC 2024 - 35.2K bytes - Viewed (1) -
src/cmd/cgo/gcc.go
func (p *Package) needsPointerCheck(f *File, t ast.Expr, arg ast.Expr) bool { // An untyped nil does not need a pointer check, and when // _cgoCheckPointer returns the untyped nil the type assertion we // are going to insert will fail. Easier to just skip nil arguments. // TODO: Note that this fails if nil is shadowed. if id, ok := arg.(*ast.Ident); ok && id.Name == "nil" { return false }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Wed Sep 18 15:07:34 UTC 2024 - 97.1K bytes - Viewed (0)