Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 140 for identical (0.04 sec)

  1. android/guava-tests/test/com/google/common/math/QuantilesTest.java

          Correspondence.tolerance(ALLOWED_ERROR);
    
      /**
       * A {@link Correspondence} which accepts either finite values within {@link #ALLOWED_ERROR} of
       * each other or identical non-finite values.
       */
      private static final Correspondence<Double, Double> QUANTILE_CORRESPONDENCE =
          Correspondence.from(
              new BinaryPredicate<Double, Double>() {
                @Override
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Dec 11 20:45:32 UTC 2025
    - 29.8K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/RangeMap.java

       * value that are {@linkplain Range#isConnected connected} to this range.
       *
       * <p>The behavior of {@link #get(Comparable) get(k)} after calling this method is identical to
       * the behavior described in {@link #put(Range, Object) put(range, value)}, however the ranges
       * returned from {@link #asMapOfRanges} will be different if there were existing entries which
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/hash/HashTestUtils.java

       * 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output
       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
       * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Oct 28 18:19:59 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  4. android/guava-testlib/src/com/google/common/collect/testing/testers/CollectionToArrayTester.java

        Object[] array = collection.toArray();
        expectArrayContentsAnyOrder(createSamplesArray(), array);
      }
    
      /**
       * {@link Collection#toArray(Object[])} says: "Note that {@code toArray(new Object[0])} is
       * identical in function to {@code toArray()}."
       *
       * <p>For maximum effect, the collection under test should be created from an element array of a
       * type other than {@code Object[]}.
       */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Sep 08 18:35:13 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/reflect/TypeResolver.java

             * ours. Therefore, we have to be careful about whether we create our own TypeVariable:
             *
             * 2a. If the resolved types are identical to the original types, then we can return the
             * original, identical JDK TypeVariable. By doing so, we sidestep the problem entirely.
             *
             * 2b. If the resolved types are different from the original types, things are trickier. The
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 22:30:05 UTC 2025
    - 25.3K bytes
    - Viewed (0)
  6. src/test/java/jcifs/smb/NtlmUtilTest.java

            byte[] out14 = new byte[16];
            byte[] out7 = new byte[8];
    
            // Act
            NtlmUtil.E(key14, data8, out14);
            NtlmUtil.E(key7, data8, out7);
    
            // Assert: first block identical to single-chunk encryption
            assertArrayEquals(Arrays.copyOfRange(out14, 0, 8), out7);
            // And second block is present and not all zeros
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (1)
  7. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

            Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2);
            Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
    
            assertTrue(result1, "Identical passwords should be equal");
            assertFalse(result2, "Different passwords should not be equal");
        }
    
        /**
         * Measure the average time for equals operations.
         */
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  8. src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoRequestTest.java

                assertEquals(orderedDialects[i], SMBUtil.readInt2(buffer, 24 + i * 2));
            }
        }
    
        @Test
        @DisplayName("Test multiple encode calls produce identical output")
        void testMultipleEncodeCallsIdentical() {
            ValidateNegotiateInfoRequest request =
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  9. src/bytes/compare_test.go

    			if cmp != -1 {
    				t.Errorf(`CompareBbigger(%d,%d) = %d`, len, k, cmp)
    			}
    			b[k] = a[k]
    		}
    	}
    }
    
    func TestEndianBaseCompare(t *testing.T) {
    	// This test compares byte slices that are almost identical, except one
    	// difference that for some j, a[j]>b[j] and a[j+1]<b[j+1]. If the implementation
    	// compares large chunks with wrong endianness, it gets wrong result.
    	// no vector register is larger than 512 bytes for now
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Jul 13 23:11:42 UTC 2023
    - 6.8K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/CompactLinkedHashSet.java

     * even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like
     * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior.
     *
     * <p>This class should not be assumed to be universally superior to {@code
     * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memory
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Aug 06 14:59:07 UTC 2025
    - 9.4K bytes
    - Viewed (0)
Back to top