- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 59 for collisions (0.09 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
guava/src/com/google/common/base/Predicates.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Mar 08 16:16:42 GMT 2026 - 26.6K bytes - Click Count (0) -
docs/en/docs/tutorial/bigger-applications.md
``` To learn more about Python Packages and Modules, read [the official Python documentation about Modules](https://docs.python.org/3/tutorial/modules.html). /// ### Avoid name collisions { #avoid-name-collisions } We are importing the submodule `items` directly, instead of importing just its variable `router`. This is because we also have another variable named `router` in the submodule `users`.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Mar 07 09:29:03 GMT 2026 - 19.2K bytes - Click Count (0) -
android/guava/src/com/google/common/base/Predicates.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Mar 08 16:16:42 GMT 2026 - 26.6K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash tableCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Hashing.java
* * <p>This is designed for generating persistent fingerprints of strings. It isn't * cryptographically secure, but it produces a high-quality hash with fewer collisions than some * alternatives we've used in the past. * * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jul 17 15:26:41 GMT 2025 - 29.8K bytes - Click Count (0) -
tensorflow/c/eager/gradients.cc
#include "tensorflow/core/platform/errors.h" namespace tensorflow { namespace gradients { namespace { // TODO(b/172558015): Using the pointer address as the identifier for the tensor // may lead to collisions. Introduce another way to get a unique id for this // tensor. int64_t ToId(const AbstractTensorHandle* t) { return static_cast<int64_t>(reinterpret_cast<uintptr_t>(t)); }Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Tue Feb 24 06:18:31 GMT 2026 - 19.6K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/CompactHashSet.java
* </ul> * <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 23.9K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/Striped.java
* bulkGet(keys)} operation. See <a href="http://www.mathpages.com/home/kmath199.htm">Balls in * Bins model</a> for mathematical formulas that can be used to estimate the probability of * collisions. * * @param keys arbitrary non-null keys * @return the stripes corresponding to the objects (one per each object, derived by delegating to
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 20.6K bytes - Click Count (0) -
guava/src/com/google/common/collect/CompactHashMap.java
* </ul> * <li>another java.util.Map delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 39.6K bytes - Click Count (0) -
docs/zh/docs/tutorial/bigger-applications.md
第二个版本是「绝对导入」: ```Python from app.routers import items, users ``` 要了解有关 Python 包和模块的更多信息,请查阅[关于 Modules 的 Python 官方文档](https://docs.python.org/3/tutorial/modules.html)。 /// ### 避免名称冲突 { #avoid-name-collisions } 我们将直接导入 `items` 子模块,而不是仅导入其 `router` 变量。 这是因为我们在 `users` 子模块中也有另一个名为 `router` 的变量。 如果我们一个接一个地导入,例如: ```Python from .routers.items import router from .routers.users import router ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 19.5K bytes - Click Count (0)