- Sort Score
- Result 10 results
- Languages All
Results 761 - 770 of 955 for Changes (0.04 sec)
-
android/guava/src/com/google/common/io/ByteSource.java
* * <p>Additionally, for mutable sources such as files, a subsequent read may return a different * number of bytes if the contents are changed. * * @since 19.0 */ public Optional<Long> sizeIfKnown() { return Optional.absent(); } /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Mar 20 20:55:20 UTC 2025 - 25.7K bytes - Viewed (0) -
guava/src/com/google/common/collect/ForwardingMap.java
* * <p><b>Warning:</b> The methods of {@code ForwardingMap} forward <i>indiscriminately</i> to the * methods of the delegate. For example, overriding {@link #put} alone <i>will not</i> change the * behavior of {@link #putAll}, which can lead to unexpected behavior. In this case, you should * override {@code putAll} as well, either providing your own implementation, or delegating to theRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 17:32:30 UTC 2025 - 9.8K bytes - Viewed (0) -
LICENSES/third_party/forked/libcontainer/LICENSE
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work,Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Oct 22 13:56:22 UTC 2024 - 10.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/CycleDetectingLockFactoryTest.java
+ "the fact that the shadowed ReadLock and WriteLock are never used or " + "exposed by the superclass implementation. If the implementation has " + "changed, the code must be re-inspected to ensure that the " + "assumption is still valid.", 24, ReentrantReadWriteLock.class.getMethods().length); } private enum MyOrder { FIRST,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 16.2K bytes - Viewed (0) -
guava-tests/test/com/google/common/util/concurrent/CycleDetectingLockFactoryTest.java
+ "the fact that the shadowed ReadLock and WriteLock are never used or " + "exposed by the superclass implementation. If the implementation has " + "changed, the code must be re-inspected to ensure that the " + "assumption is still valid.", 24, ReentrantReadWriteLock.class.getMethods().length); } private enum MyOrder { FIRST,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 16.2K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ForwardingNavigableSet.java
* * <p><b>Warning:</b> The methods of {@code ForwardingNavigableSet} forward <i>indiscriminately</i> * to the methods of the delegate. For example, overriding {@link #add} alone <i>will not</i> change * the behavior of {@link #addAll}, which can lead to unexpected behavior. In this case, you should * override {@code addAll} as well, either providing your own implementation, or delegating to theRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 8.8K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedGraphTest.java
assertThat(graph.outDegree(N1)).isEqualTo(2); putEdge(N2, N1); assertThat(graph.outDegree(N1)).isEqualTo(3); } // Stable order tests // Note: Stable order means that the ordering doesn't change between iterations and versions. // Ideally, the ordering in test should never be updated. @Test public void stableIncidentEdgeOrder_edges_returnsInStableOrder() {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 12.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/HashCodeTest.java
public void testObjectHashCodeWithSameLowOrderBytes() { // These will have the same first 4 bytes (all 0). byte[] bytesA = new byte[5]; byte[] bytesB = new byte[5]; // Change only the last (5th) byte bytesA[4] = (byte) 0xbe; bytesB[4] = (byte) 0xef; HashCode hashCodeA = HashCode.fromBytes(bytesA); HashCode hashCodeB = HashCode.fromBytes(bytesB);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 13.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/ObjectArrays.java
* array is "safe" in that no references to it are maintained by the collection. The caller is * thus free to modify the returned array. * * <p>This method assumes that the collection size doesn't change while the method is running. * * <p>TODO(kevinb): support concurrently modified collections? * * @param c the collection for which to return an array of elements */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 8.9K bytes - Viewed (0) -
docs/tls/README.md
Use PowerShell to add the path of the extracted GnuTLS binary to the system path: ``` setx path "%path%;C:\Users\MyUser\Downloads\gnutls-3.4.9-w64\bin" ``` **Note:** PowerShell may need to be restarted for this change to take effect. #### 3.3.2 Generate a private key Run the following command to generate a private `.key` file: ``` certtool.exe --generate-privkey --outfile private.key ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0)