Search Options

Results per page
Sort
Preferred Languages
Advance

Results 251 - 257 of 257 for experimental (0.14 sec)

  1. android/guava/src/com/google/common/collect/CompactHashMap.java

      @VisibleForTesting(
          )
      static final double HASH_FLOODING_FPP = 0.001;
    
      /**
       * Maximum allowed length of a hash table bucket before falling back to a j.u.LinkedHashMap-based
       * implementation. Experimentally determined.
       */
      private static final int MAX_HASH_BUCKET_LENGTH = 9;
    
      // The way the `table`, `entries`, `keys`, and `values` arrays work together is as follows.
      //
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 35.7K bytes
    - Viewed (0)
  2. src/bytes/bytes.go

    			return i
    		}
    		i++
    		fails++
    		if fails >= 4+i>>4 && i < t {
    			// Give up on IndexByte, it isn't skipping ahead
    			// far enough to be better than Rabin-Karp.
    			// Experiments (using IndexPeriodic) suggest
    			// the cutover is about 16 byte skips.
    			// TODO: if large prefixes of sep are matching
    			// we should cutover at even larger average skips,
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Sep 03 14:04:47 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    waist,' the Duchess said after a pause:  `the reason is, that I'm
    doubtful about the temper of your flamingo.  Shall I try the
    experiment?'
    
      `HE might bite,' Alice cautiously replied, not feeling at all
    anxious to have the experiment tried.
    
      `Very true,' said the Duchess:  `flamingoes and mustard both
    bite.  And the moral of that is--"Birds of a feather flock
    together."'
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
  4. okhttp/src/jvmMain/resources/okhttp3/internal/publicsuffix/PublicSuffixDatabase.list

    *.eu-south-1.airflow.amazonaws.com
    *.eu-south-2.airflow.amazonaws.com
    *.eu-west-1.airflow.amazonaws.com
    *.eu-west-2.airflow.amazonaws.com
    *.eu-west-3.airflow.amazonaws.com
    *.ewp.live
    *.ex.futurecms.at
    *.ex.ortsinfo.at
    *.experiments.sagemaker.aws
    *.firenet.ch
    *.fk
    *.frusky.de
    *.futurecms.at
    *.gateway.dev
    *.hosted.app
    *.hosting.myjino.ru
    *.hosting.ovh.net
    *.id.pub
    *.il-central-1.airflow.amazonaws.com
    *.in.futurecms.at
    *.jm
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Tue May 27 22:00:49 UTC 2025
    - 129.6K bytes
    - Viewed (3)
  5. okhttp/src/androidMain/assets/PublicSuffixDatabase.list

    *.eu-south-1.airflow.amazonaws.com
    *.eu-south-2.airflow.amazonaws.com
    *.eu-west-1.airflow.amazonaws.com
    *.eu-west-2.airflow.amazonaws.com
    *.eu-west-3.airflow.amazonaws.com
    *.ewp.live
    *.ex.futurecms.at
    *.ex.ortsinfo.at
    *.experiments.sagemaker.aws
    *.firenet.ch
    *.fk
    *.frusky.de
    *.futurecms.at
    *.gateway.dev
    *.hosted.app
    *.hosting.myjino.ru
    *.hosting.ovh.net
    *.id.pub
    *.il-central-1.airflow.amazonaws.com
    *.in.futurecms.at
    *.jm
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Tue Dec 31 14:50:53 UTC 2024
    - 129.6K bytes
    - Viewed (2)
  6. okhttp/src/jvmTest/resources/okhttp3/internal/publicsuffix/public_suffix_list.dat

    studio.cn-northwest-1.sagemaker.com.cn
    
    // Amazon SageMaker with MLflow
    // Submited by: AWS Security <******@****.***>
    // Reference: c19f92b3-a82a-452d-8189-831b572eea7e
    *.experiments.sagemaker.aws
    
    // Analytics on AWS
    // Submitted by AWS Security <******@****.***>
    // Reference: 955f9f40-a495-4e73-ae85-67b77ac9cadd
    analytics-gateway.ap-northeast-1.amazonaws.com
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 309.7K bytes
    - Viewed (0)
  7. lib/fips140/v1.0.0.zip

    square-and-double // chain log2(_W * n) long. Turns out the fastest thing is to start out with // doublings, and switch to square-and-double once the exponent is large // enough to justify the cost of the multiplications. // The threshold is selected experimentally as a linear function of n. threshold := n / 4 // We calculate how many of the most-significant bits of the exponent we can // compute before crossing the threshold, and we do it with doublings. i := bits.UintSize for logR>>i <= threshold { i--...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top