- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 73 for suficiente (0.05 sec)
-
guava-testlib/src/com/google/common/collect/testing/IteratorTester.java
* </ol> * * <p>This particular order of operations may be unrealistic, and testing all 3^5 of them may be * thought of as overkill; however, it's difficult to determine which proper subset of this massive * set would be sufficient to expose any possible bug. Brute force is simpler. * * <p>To use this class the concrete subclass must implement the {@link * IteratorTester#newTargetIterator()} method. This is because it's impossible to test an Iterator
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 4.3K bytes - Viewed (0) -
compat/maven-builder-support/src/main/java/org/apache/maven/building/Problem.java
} /** * Gets the hint about the source of the problem. While the syntax of this hint is unspecified and depends on the * creator of the problem, the general expectation is that the hint provides sufficient information to the user to * track the problem back to its origin. A concrete example for such a source hint can be the file path or URL from * which the settings were read. *
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Jan 15 18:51:29 UTC 2025 - 3.4K bytes - Viewed (0) -
src/test/java/jcifs/internal/witness/WitnessRegistrationTest.java
assertTrue(seq3 > seq2); } @Test void testHeartbeatUpdate() throws InterruptedException { long initialTime = registration.getLastHeartbeat(); Thread.sleep(50); // Ensure sufficient time difference registration.updateHeartbeat(); // After update, should not be expired with long timeout assertFalse(registration.isExpired(60000));
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 23 09:06:40 UTC 2025 - 5.1K bytes - Viewed (0) -
android/guava-testlib/src/com/google/common/collect/testing/IteratorTester.java
* </ol> * * <p>This particular order of operations may be unrealistic, and testing all 3^5 of them may be * thought of as overkill; however, it's difficult to determine which proper subset of this massive * set would be sufficient to expose any possible bug. Brute force is simpler. * * <p>To use this class the concrete subclass must implement the {@link * IteratorTester#newTargetIterator()} method. This is because it's impossible to test an Iterator
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 4.3K bytes - Viewed (0) -
src/test/java/jcifs/smb1/dcerpc/ndr/NdrShortTest.java
assertEquals((byte) 0x00, bufferData[startIndex + alignmentBytes + 1], "Most significant byte should be second"); } /** * When given a buffer with sufficient length, decode performs * the inverse of encode. */ @Test void decodeFromEncodedBuffer() throws NdrException { NdrShort ns = new NdrShort(123); // masked value 123 (already fits in 8 bits)
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 5.1K bytes - Viewed (0) -
cmd/warm-backend.go
Remove(ctx context.Context, object string, rv remoteVersionID) error InUse(ctx context.Context) (bool, error) } const probeObject = "probeobject" // checkWarmBackend checks if tier config credentials have sufficient privileges // to perform all operations defined in the WarmBackend interface. func checkWarmBackend(ctx context.Context, w WarmBackend) error { remoteVersionID, err := w.Put(ctx, probeObject, strings.NewReader("MinIO"), 5)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 4K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/trans/TransTransactNamedPipeTest.java
// Verify FID is written correctly (little-endian) int writtenFid = SMBUtil.readInt2(dst, 2); assertEquals(TEST_FID, writtenFid); } @Test @DisplayName("Test writeDataWireFormat with sufficient buffer") void testWriteDataWireFormatSufficientBuffer() { // Arrange TransTransactNamedPipe trans = new TransTransactNamedPipe(mockConfig, TEST_FID, TEST_DATA, TEST_OFFSET, TEST_LENGTH);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.7K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/EndpointPair.java
// and the transitive property of equality, this implies that nodeU equals nodeV. // If nodeU equals nodeV, condition1 == condition2, so checking condition1 is sufficient. return nodeV().equals(other.nodeV()); } return nodeU().equals(other.nodeV()) && nodeV().equals(other.nodeU()); // check condition2 } @Override public int hashCode() {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 8.1K bytes - Viewed (0) -
docs/features/events.md
* The performance of these calls on the underlying network. If the network’s performance isn’t sufficient, you need to either improve the network or use less of it. ### EventListener
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 7.7K bytes - Viewed (0) -
docs/sts/wso2.md
1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0)