- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 61 for collisions (0.07 sec)
-
docs/ru/docs/tutorial/bigger-applications.md
/// ### Избегайте конфликтов имен { #avoid-name-collisions } Вместо того чтобы импортировать только переменную `router`, мы импортируем непосредственно суб-модуль `items`. Мы делаем это потому, что у нас есть ещё одна переменная `router` в суб-модуле `users`.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Thu Dec 11 21:25:03 UTC 2025 - 30.4K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Striped.java
* bulkGet(keys)} operation. See <a href="http://www.mathpages.com/home/kmath199.htm">Balls in * Bins model</a> for mathematical formulas that can be used to estimate the probability of * collisions. * * @param keys arbitrary non-null keys * @return the stripes corresponding to the objects (one per each object, derived by delegating to
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 16 22:01:32 UTC 2025 - 20.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* Test that the hash function contains no funnels. A funnel is a situation where a set of input * (key) bits 'affects' a strictly smaller set of output bits. Funneling is bad because it can * result in more-than-ideal collisions for a non-uniformly distributed key space. In practice, * most key spaces are ANYTHING BUT uniformly distributed. A bit(i) in the input is said to
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashSet.java
* </ul> * <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 24.7K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
* </ul> * <li>another java.util.Map delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/OrderingTest.java
} Ordering<Object> arbitrary = new ArbitraryOrdering() { @Override int identityHashCode(Object object) { return ((Integer) object) % 5; // fake tons of collisions! } }; // Don't let the elements be in such a predictable order list = shuffledCopy(list, new Random(1)); sort(list, arbitrary);Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Oct 10 23:13:45 UTC 2025 - 42.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
* </ul> * <li>another java.util.Map delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/OrderingTest.java
} Ordering<Object> arbitrary = new ArbitraryOrdering() { @Override int identityHashCode(Object object) { return ((Integer) object) % 5; // fake tons of collisions! } }; // Don't let the elements be in such a predictable order list = shuffledCopy(list, new Random(1)); sort(list, arbitrary);Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Oct 10 23:13:45 UTC 2025 - 42.8K bytes - Viewed (0) -
tensorflow/c/c_api.cc
Node* n = g->graph.FindNodeId(i); if (n == nullptr) continue; // Adding the gradients to the graph can alter the prefix to prevent // name collisions only if this prefix has not been provided explicitly // by the user. If it was provided, assert that it remained intact. if (prefix != nullptr && !absl::StartsWith(n->name(), prefix_cmp)) {
Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Sat Oct 04 05:55:32 UTC 2025 - 102.4K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/MapMakerInternalMap.java
* hash functions. This is critical when the concurrent hash map uses power-of-two length hash * tables, that otherwise encounter collisions for hash codes that do not differ in lower or upper * bits. * * @param h hash code */ static int rehash(int h) { // Spread bits to regularize both segment and index locations,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 18:35:44 UTC 2025 - 89.9K bytes - Viewed (0)