- Sort Score
- Num 10 results
- Language All
Results 51 - 60 of 157 for tArn (0.02 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
And all of them can use `yield`. In this case `dependency_c`, to execute its exit code, needs the value from `dependency_b` (here named `dep_b`) to still be available. And, in turn, `dependency_b` needs the value from `dependency_a` (here named `dep_a`) to be available for its exit code. {* ../../docs_src/dependencies/tutorial008_an_py310.py hl[18:19,26:27] *}Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 12.6K bytes - Click Count (0) -
doc/go_mem.html
for race-free programs are equivalent to the ones in that work. </p> <p> The memory model describes the requirements on program executions, which are made up of goroutine executions, which in turn are made up of memory operations. </p> <p> A <i>memory operation</i> is modeled by four details: </p> <ul> <li>its kind, indicating whether it is an ordinary data read, an ordinary data write,
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Aug 05 15:41:37 GMT 2025 - 26.6K bytes - Click Count (0) -
docs/bucket/replication/DESIGN.md
targets are participating in active-active replication, the replication configuration for replica metadata sync, delete marker replication and delete replication should match to avoid inconsistent picture between the clusters. It is not recommended to turn on asymmetric replication - for e.g. if three sites A,B,C are participating in replication, it would be better to avoid replication setups like A -> [B, C], B -> A. In this particular example, an object uploaded to A will be replicated to B,C. If replica...
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 14.7K bytes - Click Count (0) -
src/main/java/jcifs/smb1/util/DES.java
*/ public void setKey(final byte[] key) { // CHECK PAROTY TBD deskey(key, true, encryptKeys); deskey(key, false, decryptKeys); } // Turn an 8-byte key into internal keys. private void deskey(final byte[] keyBlock, final boolean encrypting, final int[] KnL) { int i, j, l, m, n; final int[] pc1m = new int[56];Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 22.7K bytes - Click Count (0) -
guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
doubt that it had a VERY turn-up nose, much more like a snout than a real nose; also its eyes were getting extremely small for a baby: altogether Alice did not like the look of the thing at all. `But perhaps it was only sobbing,' she thought, and looked into its eyes again, to see if there were any tears. No, there were no tears. `If you're going to turn into a pig,
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Oct 29 21:35:03 GMT 2012 - 145.2K bytes - Click Count (0) -
src/bytes/example_test.go
var b bytes.Buffer // A Buffer needs no initialization. b.Write([]byte("Hello ")) fmt.Fprintf(&b, "world!") b.WriteTo(os.Stdout) // Output: Hello world! } func ExampleBuffer_reader() { // A Buffer can turn a string or a []byte into an io.Reader. buf := bytes.NewBufferString("R29waGVycyBydWxlIQ==") dec := base64.NewDecoder(base64.StdEncoding, buf) io.Copy(os.Stdout, dec) // Output: Gophers rule! }
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon May 12 16:07:54 GMT 2025 - 16.5K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/DefaultMaven.java
// required after the execution of 9) as the AbstractLifecycleParticipants are free to mutate the MavenProject // instances, which may change dependencies which can, in turn, affect the build order. // // 11) Execute LifecycleStarter.start() // @SuppressWarnings("checkstyle:methodlength") private MavenExecutionResult doExecute(MavenExecutionRequest request) {Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Mon Dec 29 10:43:38 GMT 2025 - 28.8K bytes - Click Count (1) -
android/guava/src/com/google/common/collect/Collections2.java
* collection {@code c}. * * <p>This method iterates over the specified collection {@code c}, checking each element returned * by the iterator in turn to see if it is contained in the specified collection {@code self}. If * all elements are so contained, {@code true} is returned, otherwise {@code false}. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 22.6K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
} } /** * Create an {@code NtlmPasswordAuthentication} object with raw password * hashes. This is used exclusively by the {@code jcifs.smb1.http.NtlmSsp} * class which is in turn used by NTLM HTTP authentication functionality. */ /** * Create an NtlmPasswordAuthentication object with raw password hashes. * * @param domain the authentication domainCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 26.7K bytes - Click Count (0) -
android/guava/src/com/google/common/math/IntMath.java
* <li>this method, {@code IntMath.saturatedAbs(int)}, which returns {@code Integer.MAX_VALUE} * when passed {@code Integer.MIN_VALUE} * </ul> * * <p>Note that if your only goal is to turn a well-distributed {@code int} (such as a random * number or hash code) into a well-distributed nonnegative number, the most even distribution is * achieved not by this method or other absolute value methods, but by {@code x &
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jan 29 22:14:05 GMT 2026 - 26.1K bytes - Click Count (0)