- Sort Score
- Num 10 results
- Language All
Results 51 - 60 of 147 for Peak (0.8 seconds)
-
internal/s3select/json/reader.go
return dstRec, nil } // Close - closes underlying reader. func (r *Reader) Close() error { // Close the input. err := r.readCloser.Close() for range r.valueCh { // Drain values so we don't leak a goroutine. // Since we have closed the input, it should fail rather quickly. } return err } // NewReader - creates new JSON reader using readCloser.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 3.2K bytes - Click Count (0) -
SECURITY.md
research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running and leak or tamper with applications from other users. Please report vulnerabilities to the vendor of the affected hardware accelerator.
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/Platform.java
return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass()); } /** * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in * GWT). This is sometimes acceptable, when only server-side code could generate enough volume * that reclamation becomes important. */ @J2ktIncompatible
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 5.3K bytes - Click Count (0) -
guava-tests/test/com/google/common/cache/LocalCacheTest.java
assertThat(EntryFactory.getFactory(Strength.WEAK, false, false)).isEqualTo(EntryFactory.WEAK); assertThat(EntryFactory.getFactory(Strength.WEAK, true, false)) .isEqualTo(EntryFactory.WEAK_ACCESS); assertThat(EntryFactory.getFactory(Strength.WEAK, false, true)) .isEqualTo(EntryFactory.WEAK_WRITE); assertThat(EntryFactory.getFactory(Strength.WEAK, true, true)) .isEqualTo(EntryFactory.WEAK_ACCESS_WRITE);
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Dec 12 00:25:21 GMT 2025 - 117.5K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/cache/LocalCacheTest.java
assertThat(EntryFactory.getFactory(Strength.WEAK, false, false)).isEqualTo(EntryFactory.WEAK); assertThat(EntryFactory.getFactory(Strength.WEAK, true, false)) .isEqualTo(EntryFactory.WEAK_ACCESS); assertThat(EntryFactory.getFactory(Strength.WEAK, false, true)) .isEqualTo(EntryFactory.WEAK_WRITE); assertThat(EntryFactory.getFactory(Strength.WEAK, true, true)) .isEqualTo(EntryFactory.WEAK_ACCESS_WRITE);
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Dec 12 00:25:21 GMT 2025 - 115.9K bytes - Click Count (0) -
cmd/dynamic-timeouts.go
if duration < 0 { return } entries := int(atomic.AddInt64(&dt.entries, 1)) index := entries - 1 if index < dynamicTimeoutLogSize { dt.mutex.Lock() dt.log[index] = duration // We leak entries while we copy if entries == dynamicTimeoutLogSize { // Make copy on stack in order to call adjust() logCopy := [dynamicTimeoutLogSize]time.Duration{} copy(logCopy[:], dt.log[:])
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 4.5K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java
import com.google.common.collect.Lists; import com.google.common.collect.MapMaker; import com.google.common.collect.Maps; import com.google.common.collect.Sets; import com.google.j2objc.annotations.Weak; import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.EnumMap; import java.util.List; import java.util.Map; import java.util.Map.Entry; import java.util.Set;
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Sep 11 17:06:34 GMT 2025 - 35.9K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/collect/SynchronizedMapTest.java
public String toString() { assertTrue(Thread.holdsLock(mutex)); return super.toString(); } private static final long serialVersionUID = 0; } /* * This is somewhat of a weak test; we verify that all of the methods are * correct, but not that they're actually forwarding correctly. We also rely * on the other tests (e.g., SynchronizedSetTest) to verify that the
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Jul 18 14:47:20 GMT 2025 - 5.9K bytes - Click Count (0) -
guava/src/com/google/common/collect/Platform.java
return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass()); } /** * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in * GWT). This is sometimes acceptable, when only server-side code could generate enough volume * that reclamation becomes important. */ @J2ktIncompatible
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 5.5K bytes - Click Count (0) -
docs/changelogs/changelog_2x.md
client.networkInterceptors().add(loggingInterceptor); ``` **Warning:** Avoid `Level.HEADERS` and `Level.BODY` in production because they could leak passwords and other authentication credentials to insecure logs. * **WebSocket API now uses `RequestBody` and `ResponseBody` for messages.** This is a backwards-incompatible API change.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 26.6K bytes - Click Count (0)