- Sort Score
- Result 10 results
- Languages All
Results 151 - 160 of 4,234 for rhat (0.02 sec)
-
android/guava/src/com/google/common/hash/HashCode.java
HashCode that = (HashCode) object; return bits() == that.bits() && equalsSameBits(that); } return false; } /** * Returns a "Java hash code" for this {@code HashCode} instance; this is well-defined (so, for * example, you can safely put {@code HashCode} instances into a {@code HashSet}) but is otherwise * probably not what you want to use. */ @Override
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 12.6K bytes - Viewed (0) -
guava/src/com/google/common/reflect/Types.java
* has not added {@link AnnotatedType}. That means that we cannot implement that interface in * source code in a way that will compile on both Java and Android. If we include the {@code * getAnnotatedBounds()} method, then its return type means it won't compile on Android, while if * we don't include the method, then the compiler will complain that an abstract method is
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Sep 03 14:03:14 UTC 2025 - 23.5K bytes - Viewed (0) -
guava-tests/test/com/google/common/primitives/ImmutableLongArrayTest.java
} /* * Whenever an implementation uses `instanceof` on a parameter instance, the test has to know that * (so much for "black box") and try instances that both do and don't pass the check. The "don't" * half of that is more awkward to arrange... */ private static <T> Iterable<T> iterable(Collection<T> collection) { // return collection::iterator;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 20.5K bytes - Viewed (0) -
docs/kms/IAM.md
- Reduced server startup time. For IAM encryption with the root credentials, MinIO had to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU. - Root credentials can now be changed easily. Before, a two-step process was required to
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http/CallServerInterceptor.kt
if (hasRequestBody) { // If there's a "Expect: 100-continue" header on the request, wait for a "HTTP/1.1 100 // Continue" response before transmitting the request body. If we don't get that, return // what we did get (such as a 4xx response) without ever transmitting the request body. if ("100-continue".equals(request.header("Expect"), ignoreCase = true)) { exchange.flushRequest()
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue Jul 29 22:04:11 UTC 2025 - 7.8K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/MutableClassToInstanceMapTest.java
public void testConstraint() { /* * We'll give ourselves a pass on testing all the possible ways of breaking the constraint, * because we know that newClassMap() is implemented using ConstrainedMap which is itself * well-tested. A purist would object to this, but what can I say, we're dirty cheaters. */ map.put(Integer.class, new Integer(5));
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Feb 11 18:34:30 UTC 2025 - 4.9K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CacheControl.kt
} companion object { /** * Cache control request directives that require network validation of responses. Note that such * requests may be assisted by the cache via conditional GET requests. */ @JvmField val FORCE_NETWORK = commonForceNetwork() /** * Cache control request directives that uses the cache only, even if the cached response is
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 10K bytes - Viewed (0) -
docs/en/docs/advanced/custom-response.md
But you can also declare the `Response` that you want to be used (e.g. any `Response` subclass), in the *path operation decorator* using the `response_class` parameter. The contents that you return from your *path operation function* will be put inside of that `Response`.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 12.2K bytes - Viewed (0) -
docs/ftp/README.md
### Custom Algorithms (SFTP) Custom algorithms can be specified via command line parameters. Algorithms are comma separated. Note that valid values does not in all cases represent default values. `--sftp=pub-key-algos=...` specifies the supported client public key authentication algorithms. Note that this doesn't include certificate types since those use the underlying algorithm. This list is sent to the client if
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
src/cmd/asm/internal/lex/lex.go
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Package lex implements lexical analysis for the assembler. package lex import ( "fmt" "log" "os" "strings" "text/scanner" "cmd/internal/src" ) // A ScanToken represents an input item. It is a simple wrapping of rune, as
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 29 18:31:05 UTC 2023 - 4.1K bytes - Viewed (0)