- Sort Score
- Result 10 results
- Languages All
Results 171 - 180 of 268 for inappropriate (0.05 sec)
-
guava/src/com/google/common/primitives/ImmutableIntArray.java
* a no-op, and in some circumstances {@code this} itself is returned. However, if this instance * is a {@link #subArray} view of a larger array, this method will copy only the appropriate range * of values, resulting in an equivalent array with a smaller memory footprint. */ public ImmutableIntArray trimmed() { return isPartialView() ? new ImmutableIntArray(toArray()) : this; }Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 21.4K bytes - Viewed (0) -
fess-crawler/src/test/java/org/codelibs/fess/crawler/filter/UrlFilterTest.java
String sessionId = "test-session-013"; urlFilter.init(sessionId); try { urlFilter.processUrl(null); // Should handle null gracefully or throw appropriate exception } catch (NullPointerException e) { // Expected behavior for null input assertTrue(true); } } /** * Test processUrl with empty URLRegistered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Wed Sep 03 14:42:53 UTC 2025 - 19K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
tensorflow/c/c_api.h
// // `func` must not be null. // If `grad` is null and `func` is not in `g`, `func` is added without a // gradient. // If `grad` is null and `func` is in `g`, TF_GraphCopyFunction is a noop. // `grad` must have appropriate signature as described in the doc of // GradientDef in tensorflow/core/framework/function.proto. // // If successful, status is set to OK and `func` and `grad` are added to `g`.
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Oct 26 21:08:15 UTC 2023 - 82.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/crawler/FessCrawlerThread.java
final String url = duplicateHostHelper.convert(childUrl); super.storeChildUrl(url, parentUrl, weight, depth); } } /** * Retrieves the appropriate crawler client for the given URL based on configured rules. * This method uses client rules to determine which specific client implementation * should be used for crawling the URL, falling back to the default client if no
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 19.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
// We need to rewrite the `next` link of each of the elements so that it is in the appropriate // linked list starting from `newTable`. In general, each element from the old linked list // belongs to a different linked list from `newTable`. We insert each element in turn at the // head of its appropriate `newTable` linked list. while (oldNext != UNSET) { int entryIndex = oldNext - 1;Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/nego/Smb2NegotiateResponse.java
return bufferIndex - start; } /** * Creates a negotiate context response based on the context type. * * @param type the negotiate context type * @return the appropriate negotiate context response, or null if not recognized */ protected static NegotiateContextResponse createContext(final int type) { switch (type) { case EncryptionNegotiateContext.NEGO_CTX_ENC_TYPE:Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 24K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
## About third party integrations { #about-third-party-integrations } In this example we are using the OAuth2 "password" flow. This is appropriate when we are logging in to our own application, probably with our own frontend. Because we can trust it to receive the `username` and `password`, as we control it.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
README.md
## Patching guidelines Follow these steps to patch a specific version of TensorFlow, for example, to apply fixes to bugs or security vulnerabilities: * Clone the TensorFlow repository and switch to the appropriate branch for your desired version—for example, `r2.8` for version 2.8. * Apply the desired changes (i.e., cherry-pick them) and resolve any code conflicts. * Run TensorFlow tests and ensure they pass.Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Fri Jul 18 14:09:03 UTC 2025 - 11.6K bytes - Viewed (0) -
src/cmd/cgo/doc.go
in any package in the program are concatenated and used at link time. All the pkg-config directives are concatenated and sent to pkg-config simultaneously to add to each appropriate set of command-line flags. When the cgo directives are parsed, any occurrence of the string ${SRCDIR} will be replaced by the absolute path to the directory containing the sourceRegistered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Dec 11 23:57:34 UTC 2024 - 44K bytes - Viewed (0)