Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 111 - 120 of 262 for Algorithm (0.06 seconds)

  1. internal/hash/checksum_test.go

    				chksm.Type |= ChecksumFullObject
    			}
    
    			// Prepare the checksum map with appropriate headers
    			m := chksm.AsMap()
    			m[xhttp.AmzChecksumAlgo] = chksm.Type.String() // Set the algorithm explicitly
    			if chksm.Type.FullObjectRequested() {
    				m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeFullObject
    			} else {
    				m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeComposite
    			}
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 22 14:15:21 GMT 2025
    - 7.1K bytes
    - Click Count (0)
  2. guava/src/com/google/common/collect/SortedLists.java

          }
        };
    
        abstract int resultIndex(int higherIndex);
      }
    
      /**
       * Searches the specified naturally ordered list for the specified object using the binary search
       * algorithm.
       *
       * <p>Equivalent to {@link #binarySearch(List, Function, Object, Comparator, KeyPresentBehavior,
       * KeyAbsentBehavior)} using {@link Ordering#natural}.
       */
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 10.9K bytes
    - Click Count (0)
  3. cmd/xl-storage-format-v2_test.go

    		Mode:             0,
    		Metadata:         nil,
    		Parts:            nil,
    		Erasure: ErasureInfo{
    			Algorithm:    ReedSolomon.String(),
    			DataBlocks:   4,
    			ParityBlocks: 2,
    			BlockSize:    10000,
    			Index:        1,
    			Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8},
    			Checksums: []ChecksumInfo{{
    				PartNumber: 1,
    				Algorithm:  HighwayHash256S,
    				Hash:       nil,
    			}},
    		},
    		MarkDeleted:      false,
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 37.8K bytes
    - Click Count (0)
  4. android/guava/src/com/google/common/hash/Crc32cHashFunction.java

      }
    
      @Override
      public String toString() {
        return "Hashing.crc32c()";
      }
    
      static final class Crc32cHasher extends AbstractStreamingHasher {
    
        /*
         * The striding algorithm works roughly as follows: it is universally the case that
         * CRC(x ^ y) == CRC(x) ^ CRC(y).  The approach we take is to break the message as follows,
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Dec 28 01:26:26 GMT 2024
    - 21.2K bytes
    - Click Count (0)
  5. internal/lsync/lrwmutex.go

    const (
    	lockRetryInterval = 50 * time.Millisecond
    )
    
    // lockLoop will acquire either a read or a write lock
    //
    // The call will block until the lock is granted using a built-in
    // timing randomized back-off algorithm to try again until successful
    func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) {
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Jan 02 17:15:06 GMT 2022
    - 4.8K bytes
    - Click Count (0)
  6. guava/src/com/google/common/collect/Collections2.java

      }
    
      /**
       * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}.
       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Mar 08 16:16:42 GMT 2026
    - 23K bytes
    - Click Count (0)
  7. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if object.IsDeleteMarker {
    				log.Println("SKIPPED: DELETE marker object:", objFullPath(object))
    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 6.3K bytes
    - Click Count (0)
  8. docs/compression/README.md

    MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2)
    streaming compression due to its stability and performance.
    
    This algorithm is specifically optimized for machine generated content.
    Write throughput is typically at least 500MB/s per CPU core,
    and scales with the number of available CPU cores.
    Decompression speed is typically at least 1GB/s.
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 5.2K bytes
    - Click Count (0)
  9. docs/erasure/README.md

    ## What is Erasure Code?
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  10. src/test/java/jcifs/ACETest.java

                verify(ace).getApplyToText();
            }
        }
    
        @Nested
        @DisplayName("Windows Access Check Algorithm Tests")
        class WindowsAccessCheckTests {
    
            @Test
            @DisplayName("Should simulate access check algorithm from documentation")
            void shouldSimulateDocumentationExample() {
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 24.4K bytes
    - Click Count (0)
Back to Top