Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 65 for Office (0.05 sec)

  1. guava/src/com/google/common/util/concurrent/Striped.java

      }
    
      /**
       * ReadWriteLock implementation whose read and write locks retain a reference back to this lock.
       * Otherwise, a reference to just the read lock or just the write lock would not suffice to ensure
       * the {@code ReadWriteLock} is retained.
       */
      private static final class WeakSafeReadWriteLock implements ReadWriteLock {
        private final ReadWriteLock delegate;
    
        WeakSafeReadWriteLock() {
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 16 22:01:32 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/Tables.java

       * {@code factory.get()} does.
       *
       * <p>Call this method only when the simpler factory methods in classes like {@link
       * HashBasedTable} and {@link TreeBasedTable} won't suffice.
       *
       * <p>The views returned by the {@code Table} methods {@link Table#column}, {@link
       * Table#columnKeySet}, and {@link Table#columnMap} have iterators that don't support {@code
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Sep 22 18:35:44 UTC 2025
    - 24.9K bytes
    - Viewed (0)
  3. compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/resolver/DefaultLegacyArtifactCollector.java

            Object key = node.getKey();
    
            // TODO Does this check need to happen here? Had to add the same call
            // below when we iterate on child nodes -- will that suffice?
            if (managedVersions.containsKey(key)) {
                manageArtifact(node, managedVersions, listeners);
            }
    
            List<ResolutionNode> previousNodes = resolvedArtifacts.get(key);
    
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 36.5K bytes
    - Viewed (0)
  4. docs/fr/docs/async.md

    <img src="/img/async/concurrent-burgers/concurrent-burgers-05.png" class="illustration">
    
    Pendant que vous discutez avec votre crush 😍, de temps en temps vous jetez un coup d'oeil au nombre affichĂ© au-dessus du comptoir pour savoir si c'est Ă  votre tour d'ĂȘtre servis.
    
    Jusqu'au moment oĂč c'est (enfin) votre tour. Vous allez au comptoir, rĂ©cupĂ©rez vos burgers 🍔 et revenez Ă  votre table.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  5. doc/go_mem.html

    <p>
    Go approaches its memory model in much the same way as the rest of the language,
    aiming to keep the semantics simple, understandable, and useful.
    This section gives a general overview of the approach and should suffice for most programmers.
    The memory model is specified more formally in the next section.
    </p>
    
    <p>
    A data race is defined as
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Aug 05 15:41:37 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  6. LICENSE

    procedures, authorization keys, or other information required to install
    and execute modified versions of a covered work in that User Product from
    a modified version of its Corresponding Source.  The information must
    suffice to ensure that the continued functioning of the modified object
    code is in no case prevented or interfered with solely because
    modification has been made.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  7. guava/src/com/google/common/net/InetAddresses.java

          // Just extract the high 64 bits (assuming the rest is user-modifiable).
          addressAsLong = ByteBuffer.wrap(ip6.getAddress(), 0, 8).getLong();
        }
    
        // Many strategies for hashing are possible. This might suffice for now.
        int coercedHash = Hashing.murmur3_32_fixed().hashLong(addressAsLong).asInt();
    
        // Squash into 224/4 Multicast and 240/4 Reserved space (i.e. 224/3).
        coercedHash |= 0xe0000000;
    
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/net/InetAddresses.java

          // Just extract the high 64 bits (assuming the rest is user-modifiable).
          addressAsLong = ByteBuffer.wrap(ip6.getAddress(), 0, 8).getLong();
        }
    
        // Many strategies for hashing are possible. This might suffice for now.
        int coercedHash = Hashing.murmur3_32_fixed().hashLong(addressAsLong).asInt();
    
        // Squash into 224/4 Multicast and 240/4 Reserved space (i.e. 224/3).
        coercedHash |= 0xe0000000;
    
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  9. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    court, without even waiting to put his shoes on.
    
      `--and just take his head off outside,' the Queen added to one
    of the officers:  but the Hatter was out of sight before the
    officer could get to the door.
    
      `Call the next witness!' said the King.
    
      The next witness was the Duchess's cook.  She carried the
    pepper-box in her hand, and Alice guessed who it was, even before
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
  10. CREDITS

    procedures, authorization keys, or other information required to install
    and execute modified versions of a covered work in that User Product from
    a modified version of its Corresponding Source.  The information must
    suffice to ensure that the continued functioning of the modified object
    code is in no case prevented or interfered with solely because
    modification has been made.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
Back to top