- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 63 for algorism (0.03 sec)
-
android/guava/src/com/google/common/collect/ImmutableList.java
: ImmutableList.<E>construct(elements.clone()); } /** * Returns an immutable list containing the given elements, sorted according to their natural * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the * order in which they appear in the input. * * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 27.5K bytes - Viewed (0) -
guava/src/com/google/common/math/BigIntegerMath.java
* and the arithmetic mean is always higher than the geometric mean. * * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles * with each iteration, so this algorithm takes O(log(digits)) iterations. * * We start out with a double-precision approximation, which may be higher or lower than the * true value. Therefore, we perform at least one Newton iteration to get a guess that's
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 18.8K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Fingerprint2011.java
import com.google.common.annotations.VisibleForTesting; /** * Implementation of Geoff Pike's fingerprint2011 hash function. See {@link Hashing#fingerprint2011} * for information on the behaviour of the algorithm. * * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0) -
maven-tests/mvnw.cmd
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Jul 12 12:05:57 UTC 2025 - 6.8K bytes - Viewed (0) -
android/guava/src/com/google/common/escape/CharEscaper.java
* from the resulting text. * * <p>If the character does not need to be escaped, this method should return {@code null}, rather * than a one-character array containing the character itself. This enables the escaping algorithm * to perform more efficiently. * * <p>An escaper is expected to be able to deal with any {@code char} value, so this method should * not throw any exceptions. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Feb 13 15:45:16 UTC 2025 - 6.7K bytes - Viewed (0) -
mvnw.cmd
) IF NOT %WRAPPER_SHA_256_SUM%=="" ( powershell -Command "&{"^ "Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash;"^ "$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^ "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^ " Write-Error 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Oct 14 22:24:15 UTC 2024 - 7.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/CrawlingInfoHelper.java
}); } /** * Generates a hashed ID from the provided URL ID string. * Encodes special characters using URL encoding or Base64 encoding as needed, * then applies a message digest algorithm to create a unique hash. * * @param urlId the URL ID string to generate a hash for * @return a hashed ID string generated from the input URL ID */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 15.2K bytes - Viewed (0) -
guava/src/com/google/common/math/LongMath.java
return b; } else if (b == 0) { return a; // similar logic } /* * Uses the binary GCD algorithm; see http://en.wikipedia.org/wiki/Binary_GCD_algorithm. This is * >60% faster than the Euclidean algorithm in benchmarks. */ int aTwos = Long.numberOfTrailingZeros(a); a >>= aTwos; // divide out all 2s int bTwos = Long.numberOfTrailingZeros(b);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 29 16:20:07 UTC 2025 - 46.8K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerTest.kt
assertThat(Adapters.NULL.fromDer(bytes)).isNull() assertThat(Adapters.NULL.toDer(null)).isEqualTo(bytes) } @Test fun `sequence algorithm`() { val bytes = "300d06092a864886f70d01010b0500".decodeHex() val algorithmIdentifier = AlgorithmIdentifier( algorithm = SHA256_WITH_RSA_ENCRYPTION, parameters = null, ) assertThat(CertificateAdapters.algorithmIdentifier.fromDer(bytes))
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 31.7K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/idn/Punycode.kt
return true } var pos = pos + 4 // 'xn--'.size. // We'd prefer to operate directly on `result` but it doesn't offer insertCodePoint(), only // appendCodePoint(). The Punycode algorithm processes code points in increasing code-point // order, not in increasing index order. val codePoints = mutableListOf<Int>() // consume all code points before the last delimiter (if there is one)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 8.5K bytes - Viewed (0)