Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 417 for points (0.16 sec)

  1. android/guava-tests/test/com/google/common/graph/AbstractStandardDirectedGraphTest.java

      /**
       * Tests that the method {@code putEdge} will silently add the missing nodes to the graph, then
       * add the edge connecting them. We are not using the proxy methods here as we want to test {@code
       * putEdge} when the end-points are not elements of the graph.
       */
      @Test
      public void putEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
        graphAsMutableGraph.addNode(N1);
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Wed Sep 06 17:04:31 GMT 2023
    - 14.1K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/storage/v1beta1/generated.proto

      // volume. This field defaults to false.
      //
      // Note: After a successful initial NodePublishVolume call, subsequent calls
      // to NodePublishVolume should only update the contents of the volume. New
      // mount points will not be seen by a running container.
      //
      // +optional
      optional bool requiresRepublish = 7;
    
      // seLinuxMount specifies if the CSI driver supports "-o context"
      // mount option.
      //
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 24.9K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/storage/v1/generated.proto

      // volume. This field defaults to false.
      //
      // Note: After a successful initial NodePublishVolume call, subsequent calls
      // to NodePublishVolume should only update the contents of the volume. New
      // mount points will not be seen by a running container.
      //
      // +optional
      optional bool requiresRepublish = 7;
    
      // seLinuxMount specifies if the CSI driver supports "-o context"
      // mount option.
      //
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 24.7K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java

       * will silently add the missing nodes to the graph, then add the edge connecting them. We are not
       * using the proxy methods here as we want to test {@code addEdge} when the end-points are not
       * elements of the graph.
       */
      @Test
      public void addEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
        networkAsMutableNetwork.addNode(N1);
    Java
    - Registered: Fri Apr 19 12:43:09 GMT 2024
    - Last Modified: Wed Sep 06 17:04:31 GMT 2023
    - 19.3K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/extensions/v1beta1/generated.proto

    message IngressLoadBalancerIngress {
      // IP is set for load-balancer ingress points that are IP based.
      // +optional
      optional string ip = 1;
    
      // Hostname is set for load-balancer ingress points that are DNS based.
      // +optional
      optional string hostname = 2;
    
      // Ports provides information about the ports exposed by this LoadBalancer.
      // +listType=atomic
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 45.6K bytes
    - Viewed (0)
  6. internal/auth/credentials.go

    	ErrNoSecretKeyWithAccessKey = fmt.Errorf("secret key must be specified if access key is specified")
    )
    
    // AnonymousCredentials simply points to empty credentials
    var AnonymousCredentials = Credentials{}
    
    // IsAccessKeyValid - validate access key for right length.
    func IsAccessKeyValid(accessKey string) bool {
    	return len(accessKey) >= accessKeyMinLen
    }
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 12:41:13 GMT 2024
    - 11.7K bytes
    - Viewed (0)
  7. tensorflow/c/experimental/grappler/grappler.h

    // or removed during the graph transformation. This includes feed and fetch
    // nodes, keep_ops, init_ops. Fills in `values` and `lengths`, each of which
    // must point to an array of length at least `num_values`.
    //
    // The elements of values will point to addresses in `storage` which must be at
    // least `storage_size` bytes in length.  `num_values` and `storage` can be
    // obtained from TF_GetNodesToPreserveSize
    //
    C
    - Registered: Tue Feb 27 12:39:08 GMT 2024
    - Last Modified: Wed Aug 03 18:08:43 GMT 2022
    - 12.5K bytes
    - Viewed (0)
  8. cmd/metacache-server-pool.go

    	if err := checkListObjsArgs(ctx, o.Bucket, o.Prefix, o.Marker); err != nil {
    		return entries, err
    	}
    
    	// Marker points to before the prefix, just ignore it.
    	if o.Marker < o.Prefix {
    		o.Marker = ""
    	}
    
    	// Marker is set validate pre-condition.
    	if o.Marker != "" && o.Prefix != "" {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 12.8K bytes
    - Viewed (0)
  9. guava-tests/test/com/google/common/graph/AbstractStandardDirectedNetworkTest.java

       * will silently add the missing nodes to the graph, then add the edge connecting them. We are not
       * using the proxy methods here as we want to test {@code addEdge} when the end-points are not
       * elements of the graph.
       */
      @Test
      public void addEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
        networkAsMutableNetwork.addNode(N1);
    Java
    - Registered: Fri Apr 19 12:43:09 GMT 2024
    - Last Modified: Wed Sep 06 17:04:31 GMT 2023
    - 21.6K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/hash/HashFunction.java

     *       to <i>some</i> degree to make this unlikely. (Without this condition, a function that
     *       always returns zero could be called a hash function. It is not.)
     * </ul>
     *
     * <p>Summarizing the last two points: "equal yield equal <i>always</i>; unequal yield unequal
     * <i>often</i>." This is the most important characteristic of all hash functions.
     *
     * <h3>Desirable properties</h3>
     *
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Tue May 25 18:22:59 GMT 2021
    - 10.9K bytes
    - Viewed (0)
Back to top