Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 41 for collisions (0.49 sec)

  1. guava/src/com/google/common/hash/Hashing.java

       *
       * <p>This is designed for generating persistent fingerprints of strings. It isn't
       * cryptographically secure, but it produces a high-quality hash with fewer collisions than some
       * alternatives we've used in the past.
       *
       * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:06:57 UTC 2025
    - 31.1K bytes
    - Viewed (0)
  2. cmd/erasure-metadata-utils.go

    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    func hashOrder(key string, cardinality int) []int {
    	if cardinality <= 0 {
    		// Returns an empty int slice for cardinality < 0.
    		return nil
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/oauth2-jwt.md

    Using these ideas, JWT can be used for way more sophisticated scenarios.
    
    In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`).
    
    So, to avoid ID collisions, when creating the JWT token for the user, you could prefix the value of the `sub` key, e.g. with `username:`. So, in this example, the value of `sub` could have been: `username:johndoe`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/collect/CompactHashSet.java

       *       </ul>
       *   <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/util/concurrent/Striped.java

       * bulkGet(keys)} operation. See <a href="http://www.mathpages.com/home/kmath199.htm">Balls in
       * Bins model</a> for mathematical formulas that can be used to estimate the probability of
       * collisions.
       *
       * @param keys arbitrary non-null keys
       * @return the stripes corresponding to the objects (one per each object, derived by delegating to
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  6. guava-tests/test/com/google/common/hash/HashTestUtils.java

       * Test that the hash function contains no funnels. A funnel is a situation where a set of input
       * (key) bits 'affects' a strictly smaller set of output bits. Funneling is bad because it can
       * result in more-than-ideal collisions for a non-uniformly distributed key space. In practice,
       * most key spaces are ANYTHING BUT uniformly distributed. A bit(i) in the input is said to
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/CompactHashMap.java

       *       </ul>
       *   <li>another java.util.Map delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 39.6K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/collect/CompactHashMap.java

       *       </ul>
       *   <li>another java.util.Map delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 35.7K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/MapMakerInternalMap.java

       * hash functions. This is critical when the concurrent hash map uses power-of-two length hash
       * tables, that otherwise encounter collisions for hash codes that do not differ in lower or upper
       * bits.
       *
       * @param h hash code
       */
      static int rehash(int h) {
        // Spread bits to regularize both segment and index locations,
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 90K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.7.md

    #### Deployments
    * [beta] Deployments uses a hashing collision avoidance mechanism that ensures new rollouts will not block on hashing collisions anymore. ([kubernetes/features#287](https://github.com/kubernetes/enhancements/issues/287))
    
    #### PodDisruptionBudget
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (1)
Back to top