Search Options

Results per page
Sort
Preferred Languages
Advance

Results 171 - 180 of 426 for Real (0.02 sec)

  1. android/guava/src/com/google/common/util/concurrent/AggregateFuture.java

          return "futures=" + localFutures;
        }
        return super.pendingToString();
      }
    
      /**
       * Must be called at the end of each subclass's constructor. This method performs the "real"
       * initialization; we can't put this in the constructor because, in the case where futures are
       * already complete, we would not initialize the subclass before calling {@link
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 16K bytes
    - Viewed (0)
  2. src/test/java/jcifs/internal/dfs/DfsReferralRequestBufferTest.java

                    mockedSMBUtil.verify(() -> SMBUtil.writeInt2(eq(0L), any(byte[].class), anyInt()));
                }
            }
    
            @Test
            @DisplayName("Should encode correctly with real SMBUtil")
            void testRealSMBUtilEncoding() {
                String path = "\\\\server\\share\\file.txt";
                int maxReferralLevel = 4;
                buffer = new DfsReferralRequestBuffer(path, maxReferralLevel);
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 17.5K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     *       rate when using completely <i>random</i> sample input. The true test of a hash function is
     *       how it performs on representative real-world data, which tends to contain many hidden
     *       patterns and clumps. The goal of a good hash function is to stamp these patterns out as
     *       thoroughly as possible.
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       rate when using completely <i>random</i> sample input. The true test of a hash function is
     *       how it performs on representative real-world data, which tends to contain many hidden
     *       patterns and clumps. The goal of a good hash function is to stamp these patterns out as
     *       thoroughly as possible.
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. ci/official/utilities/code_check_full.bats

    of dynamically. Here's the output from bazel query:
    EOF
      cat $BATS_TEST_TMPDIR/out
      [[ ! -s $BATS_TEST_TMPDIR/out ]]
    }
    
    @test "All tensorflow.org/code links point to real files" {
        for i in $(grep -onI 'https://www.tensorflow.org/code/[a-zA-Z0-9/._-]\+' -r tensorflow); do
            target=$(echo $i | sed 's!.*https://www.tensorflow.org/code/!!g')
    
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Fri Dec 19 18:47:57 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  6. cmd/admin-handlers-idp-ldap.go

    	var (
    		targetGroups []string
    		err          error
    	)
    
    	// If we are creating svc account for request sender, ensure that targetUser
    	// is a real user (i.e. not derived credentials).
    	if isSvcAccForRequestor {
    		if requestorIsDerivedCredential {
    			if requestorParentUser == "" {
    				writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx,
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  7. src/bufio/scan.go

    	// FullRune distinguishes correctly between erroneous and incomplete encodings.
    	if !atEOF && !utf8.FullRune(data) {
    		// Incomplete; get more bytes.
    		return 0, nil, nil
    	}
    
    	// We have a real UTF-8 encoding error. Return a properly encoded error rune
    	// but advance only one byte. This matches the behavior of a range loop over
    	// an incorrectly encoded string.
    	return 1, errorRune, nil
    }
    
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Wed May 21 18:05:26 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  8. src/test/java/jcifs/ACETest.java

                verify(ace, times(2)).getAccessMask();
                verify(ace, times(1)).isAllow();
                verify(ace, times(1)).getFlags();
            }
        }
    
        @Nested
        @DisplayName("Real-world Usage Scenarios")
        class RealWorldUsageTests {
    
            @Test
            @DisplayName("Should handle typical file system permission scenarios")
            void shouldHandleFileSystemPermissions() {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 24.4K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/base/Verify.java

     * except that they are always enabled. These methods should be used instead of Java assertions
     * whenever there is a chance the check may fail "in real life". Example:
     *
     * {@snippet :
     * Bill bill = remoteService.getLastUnpaidBill();
     *
     * // In case bug 12345 happens again we'd rather just die
     * Verify.verify(bill.status() == Status.UNPAID,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 18.3K bytes
    - Viewed (0)
  10. guava/src/com/google/common/net/InetAddresses.java

       *
       * <p>NOTE: an IPv6 address coerced to an IPv4 address can only be used for such purposes as
       * rudimentary identification or indexing into a collection of real {@link InetAddress}es. They
       * cannot be used as real addresses for the purposes of network communication.
       *
       * @param ip {@link InetAddress} to convert
       * @return {@code int}, "coerced" if ip is not an IPv4 address
       * @since 7.0
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
Back to top