Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 163 for flowers (0.11 sec)

  1. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/first-steps.md

    ## The `password` flow { #the-password-flow }
    
    Now let's go back a bit and understand what is all that.
    
    The `password` "flow" is one of the ways ("flows") defined in OAuth2, to handle security and authentication.
    
    OAuth2 was designed so that the backend or API could be independent of the server that authenticates the user.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  3. src/test/java/jcifs/internal/dtyp/SecurityInfoTest.java

                }
            }
        }
    
        @Test
        @DisplayName("Test constant values follow bit flag pattern")
        void testConstantsBitFlagPattern() {
            // Most values should be powers of 2 for bit flag usage
            assertTrue(isPowerOfTwo(SecurityInfo.OWNER_SECURITY_INFO));
            assertTrue(isPowerOfTwo(SecurityInfo.GROUP_SECURITY_INFO));
            assertTrue(isPowerOfTwo(SecurityInfo.DACL_SECURITY_INFO));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.5K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/suggest/converter/KatakanaToAlphabetConverter.java

        /** Transliterator for any-lower. */
        protected Transliterator anyLower;
    
        /**
         * Constructor for KatakanaToAlphabetConverter.
         */
        public KatakanaToAlphabetConverter() {
            convertMap = generateConvertMapping();
            fullWidthHalfWidth = Transliterator.getInstance("Fullwidth-Halfwidth");
            anyLower = Transliterator.getInstance("Any-Lower");
        }
    
        @Override
    Registered: Fri Sep 19 09:08:11 UTC 2025
    - Last Modified: Fri Jul 04 14:00:23 UTC 2025
    - 10.8K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/math/Quantiles.java

       * {@code upper}. Assumes that {@code lower <= upper}. Correctly handles infinities (but not
       * {@code NaN}).
       */
      private static double interpolate(double lower, double upper, double remainder, double scale) {
        if (lower == NEGATIVE_INFINITY) {
          if (upper == POSITIVE_INFINITY) {
            // Return NaN when lower == NEGATIVE_INFINITY and upper == POSITIVE_INFINITY:
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 30.1K bytes
    - Viewed (0)
  6. docs/de/docs/tutorial/security/index.md

        * HTTP Basic Authentication.
        * HTTP Digest, usw.
    * `oauth2`: Alle OAuth2-Methoden zum Umgang mit Sicherheit (genannt „Flows“).
        * Mehrere dieser Flows eignen sich zum Aufbau eines OAuth 2.0-Authentifizierungsanbieters (wie Google, Facebook, X (Twitter), GitHub usw.):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 5.1K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/index.md

        * HTTP Basic authentication.
        * HTTP Digest, etc.
    * `oauth2`: all the OAuth2 ways to handle security (called "flows").
        * Several of these flows are appropriate for building an OAuth 2.0 authentication provider (like Google, Facebook, X (Twitter), GitHub, etc):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  8. docs/en/docs/css/custom.css

    a.internal-link::after {
      /* \00A0 is a non-breaking space
            to make the mark be on the same line as the link
        */
      content: "\00A0↪";
    }
    
    .shadow {
      box-shadow: 5px 5px 10px #999;
    }
    
    /* Give space to lower icons so Gitter chat doesn't get on top of them */
    .md-footer-meta {
      padding-bottom: 2em;
    }
    
    .user-list {
      display: flex;
      flex-wrap: wrap;
      margin-bottom: 2rem;
    }
    
    .user-list-center {
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Wed Jul 17 02:12:29 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  9. docs/fa/docs/tutorial/security/index.md

        * احراز هویت پایه HTTP.
        * ویژگی HTTP Digest و غیره.
    * شیوه `oauth2`: تمام روش‌های OAuth2 برای مدیریت امنیت (به نام "flows").
        * چندین از این flows برای ساخت یک ارائه‌دهنده احراز هویت OAuth 2.0 مناسب هستند (مانند گوگل، فیسبوک، توییتر، گیت‌هاب و غیره):
            * ویژگی `implicit`
            * ویژگی `clientCredentials`
            * ویژگی `authorizationCode`
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  10. .github/ISSUE_TEMPLATE/tflite-converter-issue.md

    ### 3. Failure after conversion
    If the conversion is successful, but the generated model is wrong, then state what is wrong:
    
    - Model produces wrong results and/or has lesser accuracy.
    - Model produces correct results, but it is slower than expected.
    
    ### 4. (optional) RNN conversion support
    If converting TF RNN to TFLite fused RNN ops, please prefix [RNN] in the title.
    
    ### 5. (optional) Any other info / logs
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Jun 15 03:35:58 UTC 2022
    - 2.1K bytes
    - Viewed (0)
Back to top