Search Options

Results per page
Sort
Preferred Languages
Advance

Results 631 - 640 of 772 for tlen (0.16 sec)

  1. docs/en/docs/features.md

    # and get editor support inside the function
    def main(user_id: str):
        return user_id
    
    
    # A Pydantic model
    class User(BaseModel):
        id: int
        name: str
        joined: date
    ```
    
    That can then be used like:
    
    ```Python
    my_user: User = User(id=3, name="John Doe", joined="2018-07-19")
    
    second_user_data = {
        "id": 4,
        "name": "Mary",
        "joined": "2018-11-30",
    }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.5K bytes
    - Viewed (0)
  2. fess-crawler/src/main/java/org/codelibs/fess/crawler/transformer/impl/XpathTransformer.java

     * {@link XpathTransformer} is a class that transforms HTML content into XML format based on XPath expressions.
     * It extracts data from an HTML document by applying XPath rules defined in {@link #fieldRuleMap}.
     * The extracted data is then formatted into an XML structure and stored in the {@link ResultData}.
     * <p>
     * This class extends {@link HtmlTransformer} and overrides the {@link #storeData(ResponseData, ResultData)} method
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sun Jul 06 02:13:03 UTC 2025
    - 13.1K bytes
    - Viewed (0)
  3. src/main/webapp/js/jquery-3.7.1.min.js

    O=ce.Deferred();function P(){C.removeEventListener("DOMContentLoaded",P),ie.removeEventListener("load",P),ce.ready()}ce.fn.ready=function(e){return O.then(e)["catch"](function(e){ce.readyException(e)}),this},ce.extend({isReady:!1,readyWait:1,ready:function(e){(!0===e?--ce.readyWait:ce.isReady)||(ce.isReady=!0)!==e&&0<--ce.readyWait||O.resolveWith(C,[ce])}}),ce.ready.then=O.then,"complete"===C.readyState||"loading"!==C.readyState&&!C.documentElement.doScroll?ie.setTimeout(ce.ready):(C.addEventListener("DOMConte...
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 85.5K bytes
    - Viewed (0)
  4. android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java

      }
    
      /**
       * This test checks an implementation dependent feature. It tests that the method {@code addEdge}
       * will silently add the missing nodes to the graph, then add the edge connecting them. We are not
       * using the proxy methods here as we want to test {@code addEdge} when the end-points are not
       * elements of the graph.
       */
      @Test
      public void addEdge_nodesNotInGraph() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/eventbus/EventBus.java

     * href="https://docs.spring.io/spring-framework/docs/current/reference/html/core.html#beans-introduction">Spring</a>.
     * Frameworks typically offer a way to register multiple listeners independently and then request
     * them together as a set (<a href="https://dagger.dev/dev-guide/multibindings">Dagger</a>, <a
     * href="https://github.com/google/guice/wiki/Multibindings">Guice</a>, <a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  6. mockwebserver/src/main/kotlin/mockwebserver3/MockResponse.kt

          name: String,
          value: Any,
        ): Builder =
          apply {
            addHeaderLenient(headers_, name, value.toString())
          }
    
        /** Removes all headers named [name], then adds a new header with the name and value. */
        public fun setHeader(
          name: String,
          value: Any,
        ): Builder =
          apply {
            removeHeader(name)
            addHeader(name, value)
          }
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 17.8K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/Config.java

            final String p = getProperty(key);
            if (p != null) {
                final StringTokenizer tok = new StringTokenizer(p, delim);
                final int len = tok.countTokens();
                final InetAddress[] arr = new InetAddress[len];
                for (int i = 0; i < len; i++) {
                    final String addr = tok.nextToken();
                    try {
                        arr[i] = InetAddress.getByName(addr);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 14.5K bytes
    - Viewed (0)
  8. src/main/webapp/js/popper.min.js

    f.reset=!1,r=-1}}},update:(i=function(){return new Promise((function(e){u.forceUpdate(),e(f)}))},function(){return s||(s=new Promise((function(e){Promise.resolve().then((function(){s=void 0,e(i())}))}))),s}),destroy:function(){l(),p=!0}};if(!Q(e,t))return u;function l(){c.forEach((function(e){return e()})),c=[]}return u.setOptions(r).then((function(e){!p&&r.onFirstUpdate&&r.onFirstUpdate(e)})),u}}var $={passive:!0};var ee={name:"eventListeners",enabled:!0,phase:"write",fn:function(){},effect:function(e){var...
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sun Jan 12 06:14:02 UTC 2025
    - 19.7K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/ImmutableSet.java

         * e.g. hash codes adversarially designed to go into ascending table locations, which keeps
         * construction O(n) (as desired) but then can have O(n) queries later.
         *
         * <p>If this returns false, then no query can take more than O(log n).
         *
         * <p>Note that for a RegularImmutableSet with elements with truly random hash codes, contains
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 35.2K bytes
    - Viewed (0)
  10. guava/src/com/google/common/hash/Hashing.java

      }
    
      /**
       * Returns a hash function implementing the MD5 hash algorithm (128 hash bits).
       *
       * @deprecated If you must interoperate with a system that requires MD5, then use this method,
       *     despite its deprecation. But if you can choose your hash function, avoid MD5, which is
       *     neither fast nor secure. As of January 2017, we suggest:
       *     <ul>
       *       <li>For security:
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:06:57 UTC 2025
    - 31.1K bytes
    - Viewed (0)
Back to top