- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 72 for ALGORITHM (0.31 sec)
-
android/guava/src/com/google/common/graph/PredecessorsFunction.java
* topological sort) that only need a way of accessing the predecessors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * <pre>{@code * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction); * }</pre> * * you will invoke it depending on the graph representation you're using. *
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Apr 26 17:43:39 GMT 2021 - 4.1K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/SuccessorsFunction.java
* breadth first traversal) that only need a way of accessing the successors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * <pre>{@code * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction); * }</pre> * * you will invoke it depending on the graph representation you're using. *
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Apr 26 17:43:39 GMT 2021 - 4.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 5.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/MessageDigestHashFunctionTest.java
// http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html // - Some providers may choose to also include alias names. // - For example, the "SHA-1" algorithm might be referred to as "SHA1". // - The algorithm name is not case-sensitive. private static final ImmutableMap<String, HashFunction> ALGORITHMS = new ImmutableMap.Builder<String, HashFunction>() .put("MD5", Hashing.md5())
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Wed Sep 06 17:04:31 GMT 2023 - 4.2K bytes - Viewed (0) -
src/main/java/jcifs/pac/kerberos/KerberosConstants.java
static final int AUTH_DATA_RELEVANT = 1; static final int AUTH_DATA_PAC = 128; static final int DES_ENC_TYPE = 3; static final int RC4_ENC_TYPE = 23; static final String RC4_ALGORITHM = "ARCFOUR"; static final String HMAC_ALGORITHM = "HmacMD5"; static final int CONFOUNDER_SIZE = 8; static final int CHECKSUM_SIZE = 16;
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sat Jul 21 21:19:58 GMT 2018 - 1.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/SortedLists.java
} }; abstract int resultIndex(int higherIndex); } /** * Searches the specified naturally ordered list for the specified object using the binary search * algorithm. * * <p>Equivalent to {@link #binarySearch(List, Function, Object, Comparator, KeyPresentBehavior, * KeyAbsentBehavior)} using {@link Ordering#natural}. */
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Thu Feb 22 21:19:52 GMT 2024 - 10.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/MD4.java
*/ package jcifs.smb1.util; import java.security.MessageDigest; /** * Implements the MD4 message digest algorithm in Java. * <p> * <b>References:</b> * <ol> * <li> Ronald L. Rivest, * "<a href="http://www.roxen.com/rfc/rfc1320.html"> * The MD4 Message-Digest Algorithm</a>", * IETF RFC-1320 (informational). * </ol> * * <p><b>$Revision: 1.2 $</b> * @author Raif S. Naffah */
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Fri Mar 22 20:39:42 GMT 2019 - 9.3K bytes - Viewed (0) -
maven-core/src/main/java/org/apache/maven/internal/impl/PathModularization.java
* be null instead of the actual module name. This option can avoid the cost of reading module * descriptors when only the modules existence needs to be verified.</p> * * <p><b>Algorithm:</b> * If the given path is a directory, then there is a choice: * </p> * <ul> * <li><b>Package hierarchy:</b> if a {@code module-info.class} file is found at the root,
Java - Registered: Sun Mar 24 03:35:10 GMT 2024 - Last Modified: Fri Mar 01 17:18:13 GMT 2024 - 11.2K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Fri Mar 22 20:39:42 GMT 2019 - 3.4K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/collect/BinaryTreeTraverserBenchmark.java
for (int i = 0; i < size; i++) { keys[i] = rng.nextInt(); } return createTreap(Ints.asList(keys)); } // See http://en.wikipedia.org/wiki/Treap for details on the algorithm. private Optional<BinaryNode> createTreap(List<Integer> keys) { if (keys.isEmpty()) { return Optional.absent(); } int minIndex = 0; for (int i = 1; i < keys.size(); i++) {
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Tue Feb 26 19:18:53 GMT 2019 - 4.9K bytes - Viewed (0)