- Sort Score
- Result 10 results
- Languages All
Results 351 - 360 of 391 for Compare (0.07 sec)
-
src/main/java/jcifs/internal/dtyp/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComOpenAndX.java
import jcifs.internal.util.SMBUtil; import jcifs.util.Hexdump; /** * SMB1 Open AndX request message. * * This command is used to open or create a file for access over * the network with enhanced capabilities compared to the basic Open command. */ public class SmbComOpenAndX extends AndXServerMessageBlock { // flags (not the same as flags constructor argument) static final int FLAGS_RETURN_ADDITIONAL_INFO = 0x01;Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.3K bytes - Viewed (0) -
cmd/xl-storage-meta-inline.go
in := x.afterVersion() sz, buf, _ := msgp.ReadMapHeaderBytes(in) newKeys := make([][]byte, 0, sz) newVals := make([][]byte, 0, sz) var removeKey func(s []byte) bool // Copy if big number of compares... if len(keys) > 5 && sz > 5 { mKeys := make(map[string]struct{}, len(keys)) for _, key := range keys { mKeys[key] = struct{}{} } removeKey = func(s []byte) bool { _, ok := mKeys[string(s)]
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 9.4K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/CsvExtractor.java
import org.codelibs.fess.crawler.exception.ExtractException; /** * Extracts text content and metadata from CSV files. * This extractor provides better structured data extraction compared to Tika's generic text extraction. * * <p>Features: * <ul> * <li>Automatic delimiter detection (comma, tab, semicolon, pipe)</li> * <li>Header row detection and extraction</li>
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Dec 11 08:38:29 UTC 2025 - 12.8K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AtomicDoubleArray.java
* java.util.concurrent.atomic} package specification for description of the properties of atomic * variables. * * <p><a id="bitEquals"></a>This class compares primitive {@code double} values in methods such as * {@link #compareAndSet} by comparing their bitwise representation using {@link * Double#doubleToRawLongBits}, which differs from both the primitive double {@code ==} operator and
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/IntervalControlHelper.java
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sun Nov 23 12:34:02 UTC 2025 - 10K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/JsonExtractor.java
import com.fasterxml.jackson.databind.node.ArrayNode; import com.fasterxml.jackson.databind.node.ObjectNode; /** * Extracts text content and metadata from JSON files. * This extractor provides better structured data extraction compared to Tika's generic text extraction. * * <p>Features: * <ul> * <li>Structured text extraction with key-value pairs</li> * <li>Top-level field extraction as metadata</li>
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Sun Nov 23 03:46:53 UTC 2025 - 9.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/PeekingIteratorTest.java
*/ @SuppressWarnings("serial") // No serialization is used in this test @GwtCompatible @NullMarked public class PeekingIteratorTest extends TestCase { /** * Version of {@link IteratorTester} that compares an iterator over a given collection of elements * (used as the reference iterator) against a {@code PeekingIterator} that *wraps* such an * iterator (used as the target iterator). *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 17:50:58 UTC 2025 - 8.5K bytes - Viewed (0)