- Sort Score
- Result 10 results
- Languages All
Results 221 - 230 of 388 for typing (0.03 sec)
-
docs/en/docs/advanced/custom-response.md
2. By using a `with` block, we make sure that the file-like object is closed after the generator function is done. So, after it finishes sending the response. 3. This `yield from` tells the function to iterate over that thing named `file_like`. And then, for each part iterated, yield that part as coming from this generator function (`iterfile`). So, it is a generator function that transfers the "generating" work to something else internally.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 12.2K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/AbstractFutureState.java
} oldHead = waitersField; // re-read and loop. } while (oldHead != Waiter.TOMBSTONE); } // re-read valueField, if we get here then we must have observed a TOMBSTONE while trying to // add a waiter. // requireNonNull is safe because valueField is always set before TOMBSTONE. return getDoneValue(requireNonNull(valueField)); }
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 33.2K bytes - Viewed (0) -
src/main/java/jcifs/audit/SecurityAuditLogger.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 26.6K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/ContentNotFoundExceptionTest.java
// If suppression is disabled, getSuppressed should return empty array assertEquals(0, exception.getSuppressed().length); } catch (Exception e) { // If an exception is thrown when trying to add suppressed, that's also valid // since suppression is disabled } // Stack trace should be empty since writableStackTrace is false
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 7.8K bytes - Viewed (0) -
android/guava/src/com/google/common/cache/Striped64.java
* needed again; and for short-lived ones, it does not matter. */ /** * Padded variant of AtomicLong supporting only raw accesses plus CAS. The value field is placed * between pads, hoping that the JVM doesn't reorder them. * * <p>JVM intrinsics note: It would be possible to use a release-only form of CAS here, if it were * provided. */ static final class Cell {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jan 15 22:17:15 UTC 2025 - 11.4K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/Service.java
* State#NEW new}, it is {@linkplain State#TERMINATED terminated} without having been started nor * stopped. If the service has already been stopped, this method returns immediately without * taking action. * * @return this * @since 15.0 */ @CanIgnoreReturnValue Service stopAsync(); /** * Waits for the {@link Service} to reach the {@linkplain State#RUNNING running state}. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 10.8K bytes - Viewed (0) -
SECURITY.md
## Untrusted inputs during training and prediction TensorFlow supports a wide range of input data formats. For example it can process images, audio, videos, and text. There are several modules specialized in taking those formats, modifying them, and/or converting them to intermediate formats that can be processed by TensorFlow. These modifications and conversions are handled by a variety of libraries that
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt
* one from the pool. We must take the pooled connection because by taking it from the pool, we've * fully acquired it. * * This test yields threads to force the decision of plan1 to be deliberate and not lucky. In * particular, we set up this sequence of events: * * 1. take plan 0 * 3. plan 0 connects * 4. finish taking plan 1 * * https://github.com/square/okhttp/issues/7152 */
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 20.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java
final byte[] cmp = new byte[SIGNATURE_LENGTH]; System.arraycopy(mac.doFinal(), 0, cmp, 0, SIGNATURE_LENGTH); // Use constant-time comparison to prevent timing attacks if (!MessageDigest.isEqual(sig, cmp)) { return false; // Signature verification failed } return true; // Signature verification succeeded } finally {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.9K bytes - Viewed (0) -
src/test/java/jcifs/util/ResourceManagerTest.java
// Check for leaks resourceManager.checkForLeaks(); Map<String, Object> stats = resourceManager.getStatistics(); // The leak counter may or may not increment depending on GC timing assertNotNull(stats.get("totalLeaks")); } private void createLeakyResource() { TestResource resource = new TestResource("leaky"); resourceManager.registerResource(resource);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 8.9K bytes - Viewed (0)