- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 57 for collisions (0.07 sec)
-
internal/logger/logrotate.go
Directory string // MaximumFileSize defines the maximum size of each log file in bytes. MaximumFileSize int64 // FileNameFunc specifies the name a new file will take. // FileNameFunc must ensure collisions in filenames do not occur. // Do not rely on timestamps to be unique, high throughput writes // may fall on the same timestamp. // Eg. // 2020-03-28_15-00-945-<random-hash>.log
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 5.8K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hashing.java
* * <p>This is designed for generating persistent fingerprints of strings. It isn't * cryptographically secure, but it produces a high-quality hash with fewer collisions than some * alternatives we've used in the past. * * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jul 19 16:02:36 UTC 2024 - 29.3K bytes - Viewed (0) -
cmd/erasure-metadata-utils.go
} return diskCount } // hashOrder - hashes input key to return consistent // hashed integer slice. Returned integer order is salted // with an input key. This results in consistent order. // NOTE: collisions are fine, we are not looking for uniqueness // in the slices returned. func hashOrder(key string, cardinality int) []int { if cardinality <= 0 { // Returns an empty int slice for cardinality < 0. return nil
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 11.7K bytes - Viewed (0) -
tensorflow/c/eager/gradients.cc
#include "tensorflow/core/platform/errors.h" namespace tensorflow { namespace gradients { namespace { // TODO(b/172558015): Using the pointer address as the identifier for the tensor // may lead to collisions. Introduce another way to get a unique id for this // tensor. int64_t ToId(const AbstractTensorHandle* t) { return static_cast<int64_t>(reinterpret_cast<uintptr_t>(t)); }
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Sat Oct 12 05:11:17 UTC 2024 - 19.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Using these ideas, JWT can be used for way more sophisticated scenarios. In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`). So, to avoid ID collisions, when creating the JWT token for the user, you could prefix the value of the `sub` key, e.g. with `username:`. So, in this example, the value of `sub` could have been: `username:johndoe`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashSet.java
* </ul> * <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 20:24:49 UTC 2024 - 24K bytes - Viewed (0) -
docs/en/docs/tutorial/bigger-applications.md
To learn more about Python Packages and Modules, read <a href="https://docs.python.org/3/tutorial/modules.html" class="external-link" target="_blank">the official Python documentation about Modules</a>. /// ### Avoid name collisions We are importing the submodule `items` directly, instead of importing just its variable `router`. This is because we also have another variable named `router` in the submodule `users`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 18.4K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Striped.java
* bulkGet(keys)} operation. See <a href="http://www.mathpages.com/home/kmath199.htm">Balls in * Bins model</a> for mathematical formulas that can be used to estimate the probability of * collisions. * * @param keys arbitrary non-null keys * @return the stripes corresponding to the objects (one per each object, derived by delegating to
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Jun 26 12:58:35 UTC 2024 - 20.6K bytes - Viewed (0)