Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 41 - 50 of 69 for secondary (0.09 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. android/guava/src/com/google/common/hash/HashFunction.java

     * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit
     * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
     * implementations in Java use). For the many uses of hash functions beyond data structures,
     * however, {@code Object.hashCode} almost always falls short -- hence this library.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  2. src/main/java/jcifs/internal/smb1/ServerMessageBlock.java

        /**
         * SMB command for transaction operations.
         */
        public static final byte SMB_COM_TRANSACTION = (byte) 0x25;
    
        /**
         * SMB command for secondary transaction operations.
         */
        public static final byte SMB_COM_TRANSACTION_SECONDARY = (byte) 0x26;
    
        /**
         * SMB command to move a file.
         */
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 38.9K bytes
    - Click Count (0)
  3. android/guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java

      }
    
      public void testImmediateTryAcquire() {
        RateLimiter r = RateLimiter.create(1);
        assertTrue("Unable to acquire initial permit", r.tryAcquire());
        assertFalse("Capable of acquiring secondary permit", r.tryAcquire());
      }
    
      public void testDoubleMinValueCanAcquireExactlyOnce() {
        RateLimiter r = RateLimiter.create(Double.MIN_VALUE, stopwatch);
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Mar 12 17:47:10 GMT 2026
    - 22K bytes
    - Click Count (0)
  4. guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java

      }
    
      public void testImmediateTryAcquire() {
        RateLimiter r = RateLimiter.create(1);
        assertTrue("Unable to acquire initial permit", r.tryAcquire());
        assertFalse("Capable of acquiring secondary permit", r.tryAcquire());
      }
    
      public void testDoubleMinValueCanAcquireExactlyOnce() {
        RateLimiter r = RateLimiter.create(Double.MIN_VALUE, stopwatch);
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Mar 12 17:47:10 GMT 2026
    - 22K bytes
    - Click Count (0)
  5. guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedPriorityBlockingQueue.java

     *
     * <p>Operations on this class make no guarantees about the ordering of elements with equal
     * priority. If you need to enforce an ordering, you can define custom classes or comparators that
     * use a secondary key to break ties in primary priority values. For example, here is a class that
     * applies first-in-first-out tie-breaking to comparable elements. To use it, you would insert a
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Mar 23 21:06:42 GMT 2026
    - 19K bytes
    - Click Count (0)
  6. guava/src/com/google/common/collect/StandardTable.java

    import java.util.Spliterator;
    import java.util.Spliterators;
    import org.jspecify.annotations.Nullable;
    
    /**
     * {@link Table} implementation backed by a map that associates row keys with column key / value
     * secondary maps. This class provides rapid access to records by the row key alone or by both keys,
     * but not by just the column key.
     *
     * <p>The views returned by {@link #column}, {@link #columnKeySet()}, and {@link #columnMap()} have
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Mar 08 16:16:42 GMT 2026
    - 30.4K bytes
    - Click Count (0)
  7. src/main/webapp/js/admin/popper.min.js

    )),ae({},e,o)},secondary:function(e){var o='right'===e?'left':'top',n=f[o];return f[e]>a[e]&&!t.escapeWithReference&&(n=Q(f[o],a[e]-('right'===e?f.width:f.height))),ae({},o,n)}};return l.forEach(function(e){var t=-1===['left','top'].indexOf(e)?'secondary':'primary';f=le({},f,m[t](e))}),e.offsets.popper=f,e},priority:['left','right','top','bottom'],padding:5,boundariesElement:'scrollParent'},keepTogether:{order:400,enabled:!0,fn:function(e){var t=e.offsets,o=t.popper,n=t.reference,i=e.placement.s...
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Oct 26 01:49:09 GMT 2024
    - 20.7K bytes
    - Click Count (0)
  8. android/guava/src/com/google/common/collect/StandardTable.java

    import java.util.Map;
    import java.util.Map.Entry;
    import java.util.Set;
    import org.jspecify.annotations.Nullable;
    
    /**
     * {@link Table} implementation backed by a map that associates row keys with column key / value
     * secondary maps. This class provides rapid access to records by the row key alone or by both keys,
     * but not by just the column key.
     *
     * <p>The views returned by {@link #column}, {@link #columnKeySet()}, and {@link #columnMap()} have
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Sep 22 18:35:44 GMT 2025
    - 29.4K bytes
    - Click Count (0)
  9. src/main/webapp/css/admin/adminlte.min.css.map

    background-color: #9fcdff;\n}\n\n.table-hover .table-primary:hover > td,\n.table-hover .table-primary:hover > th {\n  background-color: #9fcdff;\n}\n\n.table-secondary,\n.table-secondary > th,\n.table-secondary > td {\n  background-color: #d6d8db;\n}\n\n.table-secondary th,\n.table-secondary td,\n.table-secondary thead th,\n.table-secondary tbody + tbody {\n  border-color: #b3b7bb;\n}\n\n.table-hover .table-secondary:hover {\n  background-color: #c8cbcf;\n}\n\n.table-hover .table-secondary:hover...
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Oct 26 01:49:09 GMT 2024
    - 3.7M bytes
    - Click Count (3)
  10. LICENSE

    with two steps: (1) assert copyright on the software, and (2) offer
    you this License which gives you legal permission to copy, distribute
    and/or modify the software.
    
      A secondary benefit of defending all users' freedom is that
    improvements made in alternate versions of the program, if they
    receive widespread use, become available for other developers to
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Click Count (0)
Back to Top