Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 61 for collisions (0.06 sec)

  1. guava/src/com/google/common/hash/HashFunction.java

     * including those in many JDK classes.
     *
     * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision
     * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for
     * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit
     * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/hash/Hashing.java

       *
       * <p>This is designed for generating persistent fingerprints of strings. It isn't
       * cryptographically secure, but it produces a high-quality hash with fewer collisions than some
       * alternatives we've used in the past.
       *
       * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Jul 17 15:26:41 UTC 2025
    - 29.8K bytes
    - Viewed (0)
  3. guava/src/com/google/common/base/Predicates.java

            if (!components.get(i).apply(t)) {
              return false;
            }
          }
          return true;
        }
    
        @Override
        public int hashCode() {
          // add a random number to avoid collisions with OrPredicate
          return components.hashCode() + 0x12472c2c;
        }
    
        @Override
        public boolean equals(@Nullable Object obj) {
          if (obj instanceof AndPredicate) {
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  4. cmd/erasure-metadata-utils.go

    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    func hashOrder(key string, cardinality int) []int {
    	if cardinality <= 0 {
    		// Returns an empty int slice for cardinality < 0.
    		return nil
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/security/oauth2-jwt.md

    Using these ideas, JWT can be used for way more sophisticated scenarios.
    
    In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`).
    
    So, to avoid ID collisions, when creating the JWT token for the user, you could prefix the value of the `sub` key, e.g. with `username:`. So, in this example, the value of `sub` could have been: `username:johndoe`.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 10.6K bytes
    - Viewed (0)
  6. build-logic/documentation/src/main/groovy/gradlebuild/docs/GradleUserManualPlugin.java

            excludedPackages.add("org.gradle.plugins.ide.idea.model");
            excludedPackages.add("org.gradle.api.tasks.testing.logging");
    
            // TODO - rename some incubating types to remove collisions and then remove these exclusions
            excludedPackages.add("org.gradle.plugins.binaries.model");
    
            // Exclude classes that were moved in a different package but the deprecated ones are not removed yet
    Registered: Wed Dec 31 11:36:14 UTC 2025
    - Last Modified: Thu Dec 04 14:26:28 UTC 2025
    - 19.3K bytes
    - Viewed (0)
  7. android/guava-tests/test/com/google/common/hash/HashTestUtils.java

       * Test that the hash function contains no funnels. A funnel is a situation where a set of input
       * (key) bits 'affects' a strictly smaller set of output bits. Funneling is bad because it can
       * result in more-than-ideal collisions for a non-uniformly distributed key space. In practice,
       * most key spaces are ANYTHING BUT uniformly distributed. A bit(i) in the input is said to
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Oct 28 18:19:59 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  8. docs/es/docs/tutorial/bigger-applications.md

    ///
    
    ### Evitar colisiones de nombres { #avoid-name-collisions }
    
    Estamos importando el submódulo `items` directamente, en lugar de importar solo su variable `router`.
    
    Esto se debe a que también tenemos otra variable llamada `router` en el submódulo `users`.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 19.6K bytes
    - Viewed (0)
  9. docs/pt/docs/tutorial/bigger-applications.md

    ///
    
    ### Evite colisões de nomes { #avoid-name-collisions }
    
    Estamos importando o submódulo `items` diretamente, em vez de importar apenas sua variável `router`.
    
    Isso ocorre porque também temos outra variável chamada `router` no submódulo `users`.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 20:32:40 UTC 2025
    - 19.7K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/bigger-applications.md

    ///
    
    ### Namenskollisionen vermeiden { #avoid-name-collisions }
    
    Wir importieren das Submodul `items` direkt, anstatt nur seine Variable `router` zu importieren.
    
    Das liegt daran, dass wir im Submodul `users` auch eine weitere Variable namens `router` haben.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 10 13:54:34 UTC 2025
    - 21.3K bytes
    - Viewed (0)
Back to top