- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 435 for bots (0.01 sec)
-
src/main/resources/fess_label_pt_BR.properties
labels.ignoreFailureType=Tipos de falha ignorados labels.lastAccessTime=Data do último acesso labels.notificationTo=Notificar para labels.num=Número labels.pn=Número da página labels.protocolScheme=Esquema labels.purgeByBots=Excluir por Bots labels.logLevel=Nível de log labels.purgeSearchLogDay=Excluir logs de pesquisa labels.query=Consulta labels.queryId=ID da consulta labels.rt=rt labels.searchLog=Log de pesquisa labels.sort=Ordenar
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 10 04:56:21 UTC 2025 - 45.1K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/action/FessLabels.java
public static final String LABELS_PN = "{labels.pn}"; /** The key of the message: Scheme */ public static final String LABELS_PROTOCOL_SCHEME = "{labels.protocolScheme}"; /** The key of the message: Purge Bots */ public static final String LABELS_PURGE_BY_BOTS = "{labels.purgeByBots}"; /** The key of the message: Log Level */ public static final String LABELS_LOG_LEVEL = "{labels.logLevel}";
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 05 02:36:47 UTC 2025 - 146.4K bytes - Viewed (0) -
guava/src/com/google/common/net/InetAddresses.java
* This method does so by hashing 64 bits of the IPv6 address into {@code 224.0.0.0/3} (64 bits * into 29 bits): * * <ul> * <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that. * <li>Otherwise, it hashes the upper 64 bits of the IPv6 address. * </ul> * * <p>A "coerced" IPv4 address is equivalent to itself.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
guava/src/com/google/common/math/DoubleUtils.java
static long getSignificand(double d) { checkArgument(isFinite(d), "not a normal value"); int exponent = getExponent(d); long bits = doubleToRawLongBits(d); bits &= SIGNIFICAND_MASK; return (exponent == MIN_EXPONENT - 1) ? bits << 1 : bits | IMPLICIT_BIT; } static boolean isFinite(double d) { return getExponent(d) <= MAX_EXPONENT; } static boolean isNormal(double d) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 5.1K bytes - Viewed (0) -
android/guava/src/com/google/common/math/DoubleUtils.java
static long getSignificand(double d) { checkArgument(isFinite(d), "not a normal value"); int exponent = getExponent(d); long bits = doubleToRawLongBits(d); bits &= SIGNIFICAND_MASK; return (exponent == MIN_EXPONENT - 1) ? bits << 1 : bits | IMPLICIT_BIT; } static boolean isFinite(double d) { return getExponent(d) <= MAX_EXPONENT; } static boolean isNormal(double d) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 5.1K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
* This method does so by hashing 64 bits of the IPv6 address into {@code 224.0.0.0/3} (64 bits * into 29 bits): * * <ul> * <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that. * <li>Otherwise, it hashes the upper 64 bits of the IPv6 address. * </ul> * * <p>A "coerced" IPv4 address is equivalent to itself.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
private var keySize: Int = 0 init { ecdsa256() } /** * Sets the certificate to be valid in ```[notBefore..notAfter]```. Both endpoints are specified * in the format of [System.currentTimeMillis]. Specify -1L for both values to use the default * interval, 24 hours starting when the certificate is created. */ fun validityInterval( notBefore: Long,
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 21.6K bytes - Viewed (0) -
guava/src/com/google/common/math/BigIntegerMath.java
long numeratorAccum = n; long denominatorAccum = 1; int bits = LongMath.log2(n, CEILING); int numeratorBits = bits; for (int i = 1; i < k; i++) { int p = n - i; int q = i + 1; // log2(p) >= bits - 1, because p >= n/2 if (numeratorBits + bits >= Long.SIZE - 1) { // The numerator is as big as it can get without risking overflow.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 18.8K bytes - Viewed (0) -
src/main/webapp/js/admin/plugins/form-validator/lang/tr.js
module&&module.exports?module.exports=b(require("jquery")):b(a.jQuery)}(this,function(a){!function(a,b){"use strict";a.formUtils.registerLoadedModule("lang/tr"),a(b).bind("validatorsLoaded",function(){a.formUtils.LANG={errorTitle:"Form gönderilemedi!",requiredField:"Boş bırakılamaz",requiredFields:"Gerekli tüm alanları cevaplamadınız",badTime:"Geçersiz zaman girdiniz",badEmail:"Geçersiz e-posta adresi girdiniz",badTelephone:"Geçersiz telefon numarası girdiniz",badSecurityAnswer:"Güvenlik sorusuna doğru cevap verme...
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Mon Jan 01 05:12:47 UTC 2018 - 3.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
// array. The top bits of this value are the remaining bits of the hash value that were not used // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits, // 0x89abcd80. To this is added (or'd) the `next` value, which is an index within `entries`
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0)