- Sort Score
- Result 10 results
- Languages All
Results 251 - 260 of 289 for randomid (0.72 sec)
-
guava/src/com/google/common/collect/AbstractMapBasedMultimap.java
totalSize++; if (wasEmpty) { addToMap(); } } } } /** * List decorator that stays in sync with the multimap values for a key and supports rapid random * access. */ private final class RandomAccessWrappedList extends WrappedList implements RandomAccess { RandomAccessWrappedList(
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Aug 12 15:51:57 UTC 2025 - 48.2K bytes - Viewed (0) -
android/guava/src/com/google/common/math/Quantiles.java
* * <p>The average time complexity of the computation is O(N) in the size of the dataset. There is a * worst case time complexity of O(N^2). You are extremely unlikely to hit this quadratic case on * randomly ordered data (the probability decreases faster than exponentially in N), but if you are * passing in unsanitized user data then a malicious user could force it. A light shuffle of the
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 30.1K bytes - Viewed (0) -
cmd/utils.go
return partID > globalMaxPartID } // profilerWrapper is created because pkg/profiler doesn't // provide any API to calculate the profiler file path in the // disk since the name of this latter is randomly generated. type profilerWrapper struct { // Profile recorded at start of benchmark. records map[string][]byte stopFn func() ([]byte, error) ext string }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 33K bytes - Viewed (0) -
mockwebserver/src/main/kotlin/mockwebserver3/MockWebServer.kt
.build() val webSocket = RealWebSocket( taskRunner = taskRunner, originalRequest = fancyRequest, listener = webSocketResponse.webSocketListener!!, random = SecureRandom(), pingIntervalMillis = 0, extensions = WebSocketExtensions.parse(webSocketResponse.headers), // Compress all messages if compression is enabled. minimumDeflateSize = 0L,
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Aug 02 20:36:00 UTC 2025 - 40.3K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
return new CompactHashMap<>(expectedSize); } private static final Object NOT_FOUND = new Object(); /** * Maximum allowed false positive probability of detecting a hash flooding attack given random * input. */ @VisibleForTesting( ) static final double HASH_FLOODING_FPP = 0.001; /** * Maximum allowed length of a hash table bucket before falling back to a j.u.LinkedHashMap-based
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Iterables.java
} private static <T extends @Nullable Object> boolean removeIfFromRandomAccessList( List<T> list, Predicate<? super T> predicate) { // Note: Not all random access lists support set(). Additionally, it's possible // for a list to reject setting an element, such as when the list does not permit // duplicate elements. For both of those cases, we need to fall back to a slower
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 43.6K bytes - Viewed (0) -
cmd/iam.go
// independently picks a (uniformly distributed) random time in an interval // of size = baseInterval. // // For example: // // - if baseInterval=10s, then 5s <= waitInterval() < 15s // // - if baseInterval=10m, then 5m <= waitInterval() < 15m waitInterval := func() time.Duration { // Calculate a random value such that 0 <= value < baseInterval
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
LICENSE
necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. {signature of Ty Coon}, 1 April 1990 Ty Coon, President of Vice
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
lib/fips140/v1.0.0.zip
entropy.Depleted(func(seed *[48]byte) { c = NewCounter(seed) }) return c }, } // Read fills b with cryptographically secure random bytes. In FIPS mode, it // uses an SP 800-90A Rev. 1 Deterministic Random Bit Generator (DRBG). // Otherwise, it uses the operating system's random number generator. func Read(b []byte) { if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness....
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0) -
guava/src/com/google/common/math/LongMath.java
* when passed {@code Long.MIN_VALUE} * </ul> * * <p>Note that if your only goal is to turn a well-distributed `long` (such as a random number) * into a well-distributed nonnegative number, the most even distribution is achieved not by this * method or other absolute value methods, but by {@code x & Long.MAX_VALUE}. * * @since NEXT */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 29 16:20:07 UTC 2025 - 46.8K bytes - Viewed (0)