- Sort Score
- Num 10 results
- Language All
Results 11 - 18 of 18 for edu (0.06 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
android/guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedPriorityBlockingQueue.java
@NullUnmarked public class MonitorBasedPriorityBlockingQueue<E> extends AbstractQueue<E> implements BlockingQueue<E> { // Based on revision 1.55 of PriorityBlockingQueue by Doug Lea, from // http://gee.cs.oswego.edu/cgi-bin/viewcvs.cgi/jsr166/src/main/java/util/concurrent/ private static final long serialVersionUID = 5595510919245408276L; final PriorityQueue<E> q; final Monitor monitor = new Monitor(true);
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue May 13 18:46:00 GMT 2025 - 18.9K bytes - Click Count (0) -
guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedArrayBlockingQueue.java
@NullUnmarked public class MonitorBasedArrayBlockingQueue<E> extends AbstractQueue<E> implements BlockingQueue<E> { // Based on revision 1.58 of ArrayBlockingQueue by Doug Lea, from // http://gee.cs.oswego.edu/cgi-bin/viewcvs.cgi/jsr166/src/main/java/util/concurrent/ /** The queued items */ final E[] items; /** items index for next take, poll or remove */ int takeIndex;
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue May 13 18:46:00 GMT 2025 - 22.4K bytes - Click Count (0) -
android/guava/src/com/google/common/primitives/Ints.java
// There are several well-known algorithms for rotating part of an array (or, equivalently, // exchanging two blocks of memory). This classic text by Gries and Mills mentions several: // https://ecommons.cornell.edu/bitstream/handle/1813/6292/81-452.pdf. // (1) "Reversal", the one we have here. // (2) "Dolphin". If we're rotating an array a of size n by a distance of d, then element a[0]
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Oct 22 18:14:49 GMT 2025 - 31.3K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/MoreExecutors.java
protected String pendingToString() { return "task=[" + delegate + "]"; } } } /* * This following method is a modified version of one found in * http://gee.cs.oswego.edu/cgi-bin/viewcvs.cgi/jsr166/src/test/tck/AbstractExecutorServiceTest.java?revision=1.30 * which contained the following notice: * * Written by Doug Lea with assistance from members of JCP JSR-166 Expert Group and released to
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Oct 08 18:55:33 GMT 2025 - 45.2K bytes - Click Count (0) -
guava/src/com/google/common/math/LongMath.java
// But in gcd(a - b, b), a - b is even and b is odd, so we can divide out powers of two. // We bend over backwards to avoid branching, adapting a technique from // http://graphics.stanford.edu/~seander/bithacks.html#IntegerMinOrMax long delta = a - b; // can't overflow, since a and b are nonnegative long minDeltaOrZero = delta & (delta >> (Long.SIZE - 1)); // equivalent to Math.min(delta, 0)
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Nov 03 21:01:09 GMT 2025 - 46.8K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/Futures.java
// definitely observe all earlier writes, but we still have no guarantee that done() would see // the initial write (just stronger guarantees if it does). // // See: http://cs.oswego.edu/pipermail/concurrency-interest/2015-January/013800.html // For a (long) discussion about this specific issue and the general futility of life. //
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 64.3K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
because it's not adaptive, an // attacker only learns the magnitude of p - q. if diff.BitLenVarTime() <= N.BitLen()/2-100 { return errors.New("crypto/rsa: |p - q| too small") } // Check that d > 2^(nlen/2). // // See section 3 of https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf // for more details about attacks on small d values. // // Likewise, the leakage of the magnitude of d is not adaptive. if priv.d.BitLenVarTime() <= N.BitLen()/2 { return errors.New("crypto/rsa: d too small") } return nil...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
because it's not adaptive, an // attacker only learns the magnitude of p - q. if diff.BitLenVarTime() <= N.BitLen()/2-100 { return errors.New("crypto/rsa: |p - q| too small") } // Check that d > 2^(nlen/2). // // See section 3 of https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf // for more details about attacks on small d values. // // Likewise, the leakage of the magnitude of d is not adaptive. if priv.d.BitLenVarTime() <= N.BitLen()/2 { return errors.New("crypto/rsa: d too small") } return nil...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)