- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 318 for Computed (0.04 sec)
-
buildscripts/checkdeps.sh
# Iterate down a (possible) chain of symlinks while [ -L "$TARGET_FILE" ]; do TARGET_FILE=$(env readlink $TARGET_FILE) cd $(dirname $TARGET_FILE) TARGET_FILE=$(basename $TARGET_FILE) done # Compute the canonicalized name by finding the physical path # for the directory we're in and appending the target file. PHYS_DIR=$(pwd -P) RESULT=$PHYS_DIR/$TARGET_FILE echo $RESULT } ## FIXME:
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jun 08 16:12:05 UTC 2025 - 3.4K bytes - Viewed (0) -
internal/crypto/doc.go
// with an unique key-encryption-key. Given the correct key-encryption-key the // sealed 'ObjectKey' can be unsealed and the object can be decrypted. // // ## SSE-C // // SSE-C computes the key-encryption-key from the client-provided key, an // initialization vector (IV) and the bucket/object path. // // 1. Encrypt: // Input: ClientKey, bucket, object, metadata, object_data
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 26 19:52:29 UTC 2022 - 5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/HashTestUtils.java
int[] same = new int[hashBits]; int[] diff = new int[hashBits]; // go through trials to compute probability for (int j = 0; j < trials; j++) { int key1 = rand.nextInt(); // flip input bit for key2 int key2 = key1 ^ (1 << i); // compute hash values int hash1 = function.hashInt(key1).asInt(); int hash2 = function.hashInt(key2).asInt();
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0) -
LICENSE
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/MD4.java
buffer[i] = 0; } } /** * Continues an MD4 message digest using the input byte. */ @Override public void engineUpdate(final byte b) { // compute number of bytes still unhashed; ie. present in buffer final int i = (int) (count % BLOCK_LENGTH); count++; // update number of bytes buffer[i] = b; if (i == BLOCK_LENGTH - 1) {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 9.6K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
* * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the * first permutation will be in ascending order, and the last will be in descending order. *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22.6K bytes - Viewed (0) -
internal/s3select/sql/timestampfuncs.go
case timePartSecond: duration = time.Duration(qty) * time.Second default: return nil, errNotImplemented } return FromTimestamp(t.Add(duration)), nil } // dateDiff computes the difference between two times in terms of the // `timePart` which can be years, months, days, hours, minutes or // seconds. For difference in years, months or days, the time part, // including timezone is ignored.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.8K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/DependencyScope.java
this.id = id; this.transitive = transitive; } /** * The {@code id} uniquely represents a value for this extensible enum. * This id should be used to compute the equality and hash code for the instance. * * @return the id */ @Nonnull public String id() { return id; } public boolean isTransitive() {Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Mar 19 14:33:26 UTC 2025 - 4K bytes - Viewed (0) -
cmd/rebalance-admin.go
// Load latest rebalance status meta := &rebalanceMeta{} err = meta.load(ctx, z.serverPools[0]) if err != nil { return r, err } // Compute disk usage percentage si := z.StorageInfo(ctx, true) diskStats := make([]struct { AvailableSpace uint64 TotalSpace uint64 }, len(z.serverPools)) for _, disk := range si.Disks { // Ignore invalid.Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 3.8K bytes - Viewed (0) -
LICENSE
infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To "convey" a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 33.7K bytes - Viewed (0)