Search Options

Results per page
Sort
Preferred Languages
Advance

Results 191 - 200 of 233 for knop (0.19 sec)

  1. android/guava/src/com/google/common/collect/FluentIterable.java

        if (!iterator.hasNext()) {
          return Optional.absent();
        }
    
        /*
         * TODO(kevinb): consider whether this "optimization" is worthwhile. Users with SortedSets tend
         * to know they are SortedSets and probably would not call this method.
         */
        if (iterable instanceof SortedSet) {
          SortedSet<E> sortedSet = (SortedSet<E>) iterable;
          return Optional.of(sortedSet.last());
        }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 35.3K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/CompactHashMap.java

       * - The map has not switched to delegating to a java.util implementation to mitigate hash
       *   flooding. Callers can confirm this by null-checking delegateOrNull().
       *
       * In an ideal world, we would document why we know those things are true every time we call these
       * methods. But that is a bit too painful....
       */
    
      private Object requireTable() {
        return requireNonNull(table);
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 39.6K bytes
    - Viewed (0)
  3. guava/src/com/google/common/collect/FluentIterable.java

        if (!iterator.hasNext()) {
          return Optional.absent();
        }
    
        /*
         * TODO(kevinb): consider whether this "optimization" is worthwhile. Users with SortedSets tend
         * to know they are SortedSets and probably would not call this method.
         */
        if (iterable instanceof SortedSet) {
          SortedSet<E> sortedSet = (SortedSet<E>) iterable;
          return Optional.of(sortedSet.last());
        }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 34.8K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/collect/TreeMultiset.java

         * we can reference a node whose fields have been cleared is inside the iterator (and presumably
         * only under concurrent modification).
         *
         * To access these fields when you know that they are not null, call the pred() and succ()
         * methods, which perform null checks before returning the fields.
         */
        private @Nullable AvlNode<E> pred;
        private @Nullable AvlNode<E> succ;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 33.8K bytes
    - Viewed (0)
  5. guava/src/com/google/common/io/ByteStreams.java

       *     {@code off + len} is greater than {@code b.length}
       */
      @CanIgnoreReturnValue
      // Sometimes you don't care how many bytes you actually read, I guess.
      // (You know that it's either going to read len bytes or stop at EOF.)
      public static int read(InputStream in, byte[] b, int off, int len) throws IOException {
        checkNotNull(in);
        checkNotNull(b);
        if (len < 0) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Jul 17 15:26:41 UTC 2025
    - 31.1K bytes
    - Viewed (0)
  6. cmd/admin-bucket-handlers.go

    		for _, op := range ops {
    			switch op {
    			case madmin.CredentialsUpdateType:
    				if !globalSiteReplicationSys.isEnabled() {
    					// credentials update is possible only in bucket replication. User will never
    					// know the site replicator creds.
    					tgt.Credentials = target.Credentials
    					tgt.TargetBucket = target.TargetBucket
    					tgt.Secure = target.Secure
    					tgt.Endpoint = target.Endpoint
    				}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Feb 18 16:25:55 UTC 2025
    - 33.3K bytes
    - Viewed (0)
  7. cmd/erasure-healing.go

    			// notFoundDataDirs are already greater than the data
    			// blocks all bets are off and it is safe to purge.
    			//
    			// This is purely a defensive code, ideally parityBlocks
    			// is sufficient, however we can't know that since we
    			// do have the FileInfo{}.
    			return validMeta, true
    		}
    
    		// We have no idea what this file is, leave it as is.
    		return validMeta, false
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 34.6K bytes
    - Viewed (0)
  8. cmd/admin-handlers.go

    			return
    		}
    	}
    	addErr := func(msg string) {}
    
    	// Write a version for making *incompatible* changes.
    	// The AdminClient will reject any version it does not know.
    	var inspectZipW *zip.Writer
    	if publicKey != nil {
    		w.WriteHeader(200)
    		stream := estream.NewWriter(w)
    		defer stream.Close()
    
    		clusterKey, err := bytesToPublicKey(getSubnetAdminPublicKey())
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 99.6K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/CompactHashMap.java

       * - The map has not switched to delegating to a java.util implementation to mitigate hash
       *   flooding. Callers can confirm this by null-checking delegateOrNull().
       *
       * In an ideal world, we would document why we know those things are true every time we call these
       * methods. But that is a bit too painful....
       */
    
      private Object requireTable() {
        return requireNonNull(table);
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 35.7K bytes
    - Viewed (0)
  10. LICENSE

    have the freedom to distribute copies of free software (and charge for
    them if you wish), that you receive source code or can get it if you
    want it, that you can change the software or use pieces of it in new
    free programs, and that you know you can do these things.
    
      Developers that use our General Public Licenses protect your rights
    with two steps: (1) assert copyright on the software, and (2) offer
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
Back to top