Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 161 - 170 of 767 for Uses (0.03 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. .github/workflows/mint/minio-resiliency.yaml

          - ./nginx-4-node.conf:/etc/nginx/nginx.conf:ro
        ports:
          - "9000:9000"
          - "9001:9001"
        depends_on:
          - minio1
          - minio2
          - minio3
          - minio4
    
    ## By default this config uses default local driver,
    ## For custom volumes replace with volume driver configuration.
    volumes:
      rdata1-1:
      rdata1-2:
      rdata2-1:
      rdata2-2:
      rdata3-1:
      rdata3-2:
      rdata4-1:
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed May 22 23:07:14 GMT 2024
    - 1.7K bytes
    - Click Count (0)
  2. android/guava/src/com/google/common/io/ByteProcessor.java

       * @param off the initial offset into the array
       * @param len the length of data to be processed
       * @return true to continue processing, false to stop
       */
      @CanIgnoreReturnValue // some uses know that their processor never returns false
      boolean processBytes(byte[] buf, int off, int len) throws IOException;
    
      /** Return the result of processing all the bytes. */
      @ParametricNullness
      T getResult();
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 2K bytes
    - Click Count (0)
  3. compat/maven-compat/src/main/java/org/apache/maven/repository/metadata/GraphConflictResolver.java

        String ROLE = GraphConflictResolver.class.getName();
    
        /**
         * Cleanses the supplied graph by leaving only one directed versioned edge\
         * between any two nodes, if multiple exists. Uses scope relationships, defined
         * in <code>ArtifactScopeEnum</code>
         *
         * @param graph the "dirty" graph to be simplified via conflict resolution
         * @param scope scope for which the graph should be resolved
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Fri Oct 25 12:31:46 GMT 2024
    - 1.7K bytes
    - Click Count (0)
  4. internal/http/close.go

    	if respBody != nil {
    		// Drain any remaining Body and then close the connection.
    		// Without this closing connection would disallow re-using
    		// the same connection for future uses.
    		//  - http://stackoverflow.com/a/17961593/4465767
    		defer respBody.Close()
    		xioutil.DiscardReader(respBody)
    	}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 1.7K bytes
    - Click Count (0)
  5. android/guava-tests/test/com/google/common/math/QuantilesAlgorithm.java

            double positionFrac = (double) remainder / scale;
            return dataset[positionFloor]
                + positionFrac * (dataset[positionFloor + 1] - dataset[positionFloor]);
          }
        }
      },
    
      /**
       * Uses quickselect. When calculating multiple quantiles, each quickselect starts from scratch.
       */
      QUICKSELECT {
    
        @Override
        double singleQuantile(int index, int scale, double[] dataset) {
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Mar 03 05:21:26 GMT 2026
    - 7.3K bytes
    - Click Count (0)
  6. impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/cisupport/CIDetectorHelper.java

    import java.util.List;
    import java.util.Optional;
    import java.util.ServiceLoader;
    import java.util.stream.Collectors;
    
    import org.apache.maven.api.cli.cisupport.CIInfo;
    
    /**
     * CI detector helper: it uses service discovery to discover {@link CIDetector}s. If resulting list has more than
     * one element, it will remove the {@link GenericCIDetector} result, assuming a more specific one is also present.
     */
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Sun Apr 13 18:50:07 GMT 2025
    - 1.9K bytes
    - Click Count (0)
  7. samples/slack/src/main/java/okhttp3/slack/OAuthSessionFactory.java

    import okhttp3.mockwebserver.MockResponse;
    import okhttp3.mockwebserver.MockWebServer;
    import okhttp3.mockwebserver.RecordedRequest;
    import okio.ByteString;
    
    /**
     * Runs a MockWebServer on localhost and uses it as the backend to receive an OAuth session.
     *
     * <p>Clients should call {@link #start}, {@link #newAuthorizeUrl} and {@link #close} in that order.
     * Clients may request multiple sessions.
     */
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Thu Aug 12 07:26:27 GMT 2021
    - 3.8K bytes
    - Click Count (1)
  8. android/guava-tests/test/com/google/common/util/concurrent/AbstractFutureFallbackAtomicHelperTest.java

    import junit.framework.TestSuite;
    import org.jspecify.annotations.NullUnmarked;
    
    /**
     * Tests our AtomicHelper fallback strategies in AbstractFuture.
     *
     * <p>On different platforms AbstractFuture uses different strategies for its core synchronization
     * primitives. The strategies are all implemented as subtypes of AtomicHelper and the strategy is
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Mar 07 02:20:33 GMT 2026
    - 8.3K bytes
    - Click Count (0)
  9. src/main/java/org/codelibs/fess/helper/CrawlingInfoHelper.java

         * Sets the name and expiration time based on the provided parameters.
         *
         * @param sessionId the session ID to update
         * @param name the name to set for the crawling session (uses system name if blank)
         * @param dayForCleanup number of days until cleanup (sets expiration if >= 0)
         * @throws FessSystemException if unable to store the updated crawling session
         */
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Thu Aug 07 03:06:29 GMT 2025
    - 15.2K bytes
    - Click Count (0)
  10. SECURITY.md

    are working with. When loading untrusted checkpoints, the values of the traced
    variables from your model are also going to be untrusted. That means that if
    your code interacts with the filesystem, network, etc. and uses checkpointed
    variables as part of those interactions (ex: using a string variable to build a
    filesystem path), a maliciously created checkpoint might be able to change the
    targets of those operations, which could result in arbitrary
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
Back to Top