- Sort Score
- Result 10 results
- Languages All
Results 481 - 490 of 1,016 for caisses (0.05 sec)
-
guava/src/com/google/common/base/Predicates.java
* (is a subtype of) {@code clazz}. Example: * * {@snippet : * List<Class<?>> classes = Arrays.asList( * Object.class, String.class, Number.class, Long.class); * return Iterables.filter(classes, subtypeOf(Number.class)); * } * * The code above returns an iterable containing {@code Number.class} and {@code Long.class}. *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 26.6K bytes - Viewed (0) -
android/guava-testlib/test/com/google/common/collect/testing/MapTestSuiteBuilderTests.java
}; } }, "HashMap w/out null values", ALLOWS_NULL_KEYS); } /** * Map generator that verifies that {@code setUp()} methods are called in all the test cases. The * {@code setUpRan} parameter is set true by the {@code setUp} that every test case is supposed to * have registered, and set false by the {@code tearDown}. We use a dynamic proxy to intercept allRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu May 22 16:18:11 UTC 2025 - 11.4K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/Network.java
* <li>graphs whose edges are <a * href="https://github.com/google/guava/wiki/GraphsExplained#uniqueness">unique</a> objects * </ul> * * <h3>Building a {@code Network}</h3> * * <p>The implementation classes that {@code common.graph} provides are not public, by design. To * create an instance of one of the built-in implementations of {@code Network}, use the {@link * NetworkBuilder} class: * * {@snippet :
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 07 15:57:03 UTC 2025 - 17.7K bytes - Viewed (0) -
cmd/object-api-utils_test.go
} } } } // Tests validate bucket name. func TestIsValidBucketName(t *testing.T) { testCases := []struct { bucketName string shouldPass bool }{ // cases which should pass the test. // passing in valid bucket names. {"lol", true}, {"1-this-is-valid", true}, {"1-this-too-is-valid-1", true}, {"this.works.too.1", true}, {"1234567", true},
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 24.1K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/services/MavenBuilderException.java
} /** * Formats message out of problems: problems are sorted (in natural order of {@link BuilderProblem.Severity}) * and then a list is built. These exceptions are usually thrown in "fatal" cases (and usually prevent Maven * from starting), and these exceptions may end up very early on output. * * @param message the base message to enhanceRegistered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Thu Apr 03 13:33:59 UTC 2025 - 3.2K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/com/SmbComFindClose2Test.java
* parameter word (the session identifier) is written in little‑endian form * and that the {@code toString} helper contains the expected values. * * <p>The tests also exercise edge cases such as negative (wrap‑around) session * identifiers and confirm that the writer does not alter any internal state. *</p> */ @ExtendWith(MockitoExtension.class) class SmbComFindClose2Test { @Mock
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 3.1K bytes - Viewed (0) -
internal/lock/lock_windows_test.go
// Short; unchanged: {`C:\short.txt`, `C:\short.txt`}, {`C:\`, `C:\`}, {`C:`, `C:`}, // The "long" substring is replaced by a looooooong // string which triggers the rewriting. Except in the // cases below where it doesn't. {`C:\long\foo.txt`, `\\?\C:\long\foo.txt`}, {`C:/long/foo.txt`, `\\?\C:\long\foo.txt`}, {`C:\long\foo\\bar\.\baz\\`, `\\?\C:\long\foo\bar\baz`}, {`\\unc\path`, `\\unc\path`},Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 18 18:08:15 UTC 2023 - 2.2K bytes - Viewed (0) -
android/guava/src/com/google/common/math/BigDecimalMath.java
* default rounding mode: if the two nearest representable values are equally near, the one with * the least significant bit zero is chosen. (In such cases, both of the nearest representable * values are even integers; this method returns the one that is a multiple of a greater power of * two.) *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 3K bytes - Viewed (0) -
src/test/java/jcifs/smb/SSPContextTest.java
assertThrows(CIFSException.class, () -> ctx.initSecContext(buf, 2, 2)); } @Test @DisplayName("initSecContext null token edge cases") void testInitSecContextNullToken() throws Exception { DummySSPContext ctx = new DummySSPContext(new byte[] { 1 }, false, null, null, 0, false); // len == 0 is allowed and returns empty token
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 15.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
* So, the user will have to log in again at some point later. * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases). * The frontend stores that token temporarily somewhere. * The user clicks in the frontend to go to another section of the frontend web app. * The frontend needs to fetch some more data from the API.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 8.4K bytes - Viewed (0)