- Sort Score
- Result 10 results
- Languages All
Results 451 - 460 of 748 for basedir (0.08 sec)
-
docs/pt/docs/tutorial/dependencies/index.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.3K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/TimeoutFuture.java
* The initial write to delegateRef is made definitely visible via the semantics of * addListener/SES.schedule. The later racy write in cancel() is not guaranteed to be observed, * however that is fine since the correctness is based on the atomic state in our base class. The * initial write to timer is never definitely visible to Fire.run since it is assigned after * SES.schedule is called. Therefore Fire.run has to check for null. However, it should be visible
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 8K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/ImmutableValueGraph.java
mutableValueGraph.putEdgeValue(endpoints, value); return this; } /** * Returns a newly-created {@code ImmutableValueGraph} based on the contents of this {@code * Builder}. */ public ImmutableValueGraph<N, V> build() { return ImmutableValueGraph.copyOf(mutableValueGraph); } }
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 7.9K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
/** * An Access Control Entry (ACE) is an element in a security descriptor * such as those associated with files and directories. The Windows OS * determines which users have the necessary permissions to access objects * based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/GeneratedMonitorTest.java
* {@code enterXxx}, {@code tryEnterXxx}, and {@code waitForXxx} method of the {@code Monitor} class * is analyzed reflectively to determine appropriate test cases based on its signature. Additional * ad hoc test cases can be found in {@link SupplementalMonitorTest}. * * @author Justin T. Sampson */ @NullUnmarked public class GeneratedMonitorTest extends TestCase {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 27K bytes - Viewed (0) -
guava/src/com/google/common/math/LongMath.java
} throw new AssertionError(); } @GwtIncompatible // TODO static int log10Floor(long x) { /* * Based on Hacker's Delight Fig. 11-5, the two-table-lookup, branch-free implementation. * * The key idea is that based on the number of leading zeros (equivalently, floor(log2(x))), we * can narrow the possible floor(log10(x)) values to two. For example, if floor(log2(x)) is 6,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 29 16:20:07 UTC 2025 - 46.8K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/query/QueryCommand.java
defaultQuery.add(query); }); return defaultQuery; } /** * Creates a default query builder based on the configured query type. * @return The default query builder (either dismax or bool query). */ protected DefaultQueryBuilder createDefaultQueryBuilder() {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 9.6K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
double timingRatio = (maxTime - minTime) / maxTime; assertTrue(timingRatio < TIMING_TOLERANCE, String.format( "Length-based timing attack vulnerability: timing ratio %.3f exceeds tolerance %.3f " + "(different length: %d ns, same length: %d ns)",
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
docs/ru/docs/advanced/websockets.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Feb 03 13:33:39 UTC 2025 - 8.3K bytes - Viewed (0) -
cmd/erasure-object.go
// Reorder online disks based on erasure distribution order. // Reorder parts metadata based on erasure distribution order. onlineDisks, metaArr = shuffleDisksAndPartsMetadataByIndex(onlineDisks, metaArr, fi) // For negative length read everything. if length < 0 {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 80.4K bytes - Viewed (0)