- Sort Score
- Num 10 results
- Language All
Results 171 - 180 of 1,510 for take (0.09 seconds)
-
guava/src/com/google/common/hash/Crc32cHashFunction.java
} static final class Crc32cHasher extends AbstractStreamingHasher { /* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows, * with each letter representing a 4-byte word: ABCDABCDABCDABCD... and to calculate * CRC(A000A000A000...), CRC(0B000B000B...), CRC(00C000C000C...), CRC(000D000D000D...)Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Dec 28 01:26:26 GMT 2024 - 21.2K bytes - Click Count (0) -
android/guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedPriorityBlockingQueue.java
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue May 13 18:46:00 GMT 2025 - 18.9K bytes - Click Count (0) -
docs/bucket/replication/DESIGN.md
For active-active replication, automatic failover occurs on `GET/HEAD` operations if object or object version requested qualifies for replication and is missing on one site, but present on the other. This allows the applications to take full advantage of two-way replication even before the two sites get fully synced.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 14.7K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* * ``` * pinnedRoot (trusted by CertificatePinner) * -> pinnedIntermediate (trusted by CertificatePinner) * -> realVictim * ``` * * The attacker compromises a CA. They take the public key from an intermediate certificate * signed by the compromised CA's certificate and uses it in a non-CA certificate. They ask the * pinned CA above to sign it for non-certificate-authority uses: *
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Jun 20 11:46:46 GMT 2025 - 24.3K bytes - Click Count (2) -
tensorflow/c/c_api_experimental.cc
// Update the vector with information from `input_tensors` if provided. if (input_tensors != nullptr) { // Note that we take the address of the elements in `all_input_tensors` // below. Allocate enough space so that no reallocation happens, which will // make the pointers invalid. all_input_tensors.reserve(num_inputs); for (int i = 0; i < num_inputs; ++i) {
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Sat Oct 04 05:55:32 GMT 2025 - 29.4K bytes - Click Count (0) -
internal/grid/muxclient.go
// Route directly to output. m.respWait = out } // RequestStream will send a single payload request and stream back results. // 'requests' can be nil, in which case only req is sent as input. // It will however take less resources. func (m *muxClient) RequestStream(h HandlerID, payload []byte, requests chan []byte, responses chan Response) (*Stream, error) { if m.init { return nil, errors.New("mux client already used") }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 15.9K bytes - Click Count (0) -
cmd/erasure-metadata.go
totalShards := len(partsMetadata) parities = make([]int, len(partsMetadata)) for index, metadata := range partsMetadata { if errs[index] != nil { parities[index] = -1 continue } if !metadata.IsValid() { parities[index] = -1 continue } //nolint:gocritic // Delete marker or zero byte objects take highest parity. if metadata.Deleted || metadata.Size == 0 {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 21.3K bytes - Click Count (0) -
guava-testlib/src/com/google/common/collect/testing/Helpers.java
List<?> exp = copyToList(expected); List<?> act = copyToList(actual); String actString = act.toString(); // Of course we could take pains to give the complete description of the // problem on any failure. // Yeah it's n^2. for (Object object : exp) { if (!act.remove(object)) { fail(
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Oct 10 23:13:45 GMT 2025 - 17.2K bytes - Click Count (0) -
android/guava/src/com/google/common/reflect/TypeResolver.java
// and enclosingclass -> superClass paths. // Since we follow the path of superclass first, enclosing second, // superclass mapping should take precedence. return; } // First, check whether var -> arg forms a cycle for (Type t = arg; t != null; t = mappings.get(TypeVariableKey.forLookup(t))) { if (var.equalsType(t)) {Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 23 22:30:05 GMT 2025 - 25.3K bytes - Click Count (0) -
cmd/batch-expire.go
} if i > 0 { if wait := globalBatchConfig.ExpirationWait(); wait > 0 { time.Sleep(wait) } } i++ wk.Take() go func(toExpire []expireObjInfo) { defer wk.Give() toExpireAll := make([]expireObjInfo, 0, len(toExpire)) toDel := make([]ObjectToDelete, 0, len(toExpire)) oiCache := newObjInfoCache() for _, exp := range toExpire { if exp.ExpireAll {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Apr 22 11:16:32 GMT 2025 - 23K bytes - Click Count (0)