Search Options

Results per page
Sort
Preferred Languages
Advance

Results 811 - 820 of 1,040 for each (0.02 sec)

  1. guava/src/com/google/common/collect/ForwardingNavigableMap.java

     * default} methods. Instead, it inherits their default implementations. When those implementations
     * invoke methods, they invoke methods on the {@code ForwardingNavigableMap}.
     *
     * <p>Each of the {@code standard} methods uses the map's comparator (or the natural ordering of the
     * elements, if there is no comparator) to test element equality. As a result, if the comparator is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 14.3K bytes
    - Viewed (0)
  2. guava/src/com/google/common/escape/UnicodeEscaper.java

       *
       * <p><b>Note:</b> When implementing an escaper, it is a good idea to override this method for
       * efficiency. The base class implementation determines successive Unicode code points and invokes
       * {@link #escape(int)} for each of them. If the semantics of your escaper are such that code
       * points in the supplementary range are either all escaped or all unescaped, this method can be
       * implemented more efficiently using {@link CharSequence#charAt(int)}.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Feb 13 15:45:16 UTC 2025
    - 13.2K bytes
    - Viewed (0)
  3. guava/src/com/google/common/util/concurrent/ClosingFuture.java

     *
     * <ol>
     *   <li>A pipeline starts at its leaf step (or steps), which is created from either a callable
     *       block or a {@link ListenableFuture}.
     *   <li>Each other step is derived from one or more input steps. At each step, zero or more objects
     *       can be captured for later closing.
     *   <li>There is one last step (the root of the tree), from which you can extract the final result
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Jul 23 15:26:56 UTC 2025
    - 98.1K bytes
    - Viewed (0)
  4. cmd/iam.go

    				}
    			}
    		}()
    	}
    
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    	// Calculate the waitInterval between periodic refreshes so that each server
    	// independently picks a (uniformly distributed) random time in an interval
    	// of size = baseInterval.
    	//
    	// For example:
    	//
    	//    - if baseInterval=10s, then 5s <= waitInterval() < 15s
    	//
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/behind-a-proxy.md

    And the `--root-path` command line option provides that `root_path`.
    
    ///
    
    ### Checking the current `root_path` { #checking-the-current-root-path }
    
    You can get the current `root_path` used by your application for each request, it is part of the `scope` dictionary (that's part of the ASGI spec).
    
    Here we are including it in the message just for demonstration purposes.
    
    {* ../../docs_src/behind_a_proxy/tutorial001.py hl[8] *}
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 16K bytes
    - Viewed (0)
  6. cmd/generic-handlers.go

    		// value. This is set here so that this header can be logged as
    		// part of the log entry, Error response XML and auditing.
    		// Set custom headers such as x-amz-request-id for each request.
    		w.Header().Set(xhttp.AmzRequestID, mustGetRequestID(UTCNow()))
    		if globalLocalNodeName != "" {
    			w.Header().Set(xhttp.AmzRequestHostID, globalLocalNodeNameHex)
    		}
    		h.ServeHTTP(w, r)
    	})
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 20.7K bytes
    - Viewed (1)
  7. src/test/java/jcifs/internal/smb2/Smb3KeyDerivationTest.java

            byte[] decKey = Smb3KeyDerivation.deriveDecryptionKey(dialect, sessionKey, preauthIntegrity);
    
            // Then - all keys should be different from each other
            assertFalse(Arrays.equals(signingKey, appKey), "Signing and application keys should be different");
            assertFalse(Arrays.equals(signingKey, encKey), "Signing and encryption keys should be different");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 17.5K bytes
    - Viewed (0)
  8. src/test/java/org/codelibs/fess/suggest/entity/ElevateWordTest.java

    import java.util.List;
    
    import org.junit.Before;
    import org.junit.Test;
    
    public class ElevateWordTest {
    
        private ElevateWord elevateWord;
    
        @Before
        public void setUp() {
            // Setup for each test
        }
    
        @Test
        public void testConstructorWithAllParameters() {
            // Test constructor with all parameters
            String word = "test word";
            float boost = 2.5f;
    Registered: Fri Sep 19 09:08:11 UTC 2025
    - Last Modified: Mon Sep 01 13:33:03 UTC 2025
    - 16K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/base/Preconditions.java

       *
       * @param expression a boolean expression
       * @param errorMessageTemplate a template for the exception message should the check fail. The
       *     message is formed by replacing each {@code %s} placeholder in the template with an
       *     argument. These are matched by position - the first {@code %s} gets {@code
       *     errorMessageArgs[0]}, etc. Unmatched arguments will be appended to the formatted message in
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Jul 10 22:11:00 UTC 2025
    - 53K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/CompactHashSet.java

       *   <li>null, if no entries have yet been added to the map
       * </ul>
       */
      private transient @Nullable Object table;
    
      /**
       * Contains the logical entries, in the range of [0, size()). The high bits of each int are the
       * part of the smeared hash of the element not covered by the hashtable mask, whereas the low bits
       * are the "next" pointer (pointing to the next entry in the bucket chain), which will always be
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
Back to top