- Sort Score
- Num 10 results
- Language All
Results 261 - 270 of 1,637 for another (0.06 seconds)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/ResponseBody.kt
/** * Returns a new response body that transmits this string. If [contentType] is non-null and * has a charset other than utf-8 the behaviour differs by platform. * * On the JVM the encoding will be used instead of utf-8. * * On non JVM platforms, this method will fail for encodings other than utf-8. */ @JvmStatic @JvmName("create")Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue May 27 14:51:25 GMT 2025 - 11.6K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/ForwardingMultiset.java
import java.util.Collection; import java.util.Iterator; import java.util.Objects; import java.util.Set; import org.jspecify.annotations.Nullable; /** * A multiset which forwards all its method calls to another multiset. Subclasses should override * one or more methods to modify the behavior of the backing multiset as desired per the <a * href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. *
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 10.3K bytes - Click Count (0) -
SECURITY.md
mechanisms that prevent unwanted access to the data from other tenants. Network isolation between different models is also important not only to prevent unauthorized access to data or models, but also to prevent malicious users or tenants sending graphs to execute under another tenant’s identity. The isolation mechanisms are the responsibility of the users to design and
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
guava/src/com/google/common/collect/ForwardingMap.java
import java.util.Iterator; import java.util.Map; import java.util.Objects; import java.util.Set; import org.jspecify.annotations.Nullable; /** * A map which forwards all its method calls to another map. Subclasses should override one or more * methods to modify the behavior of the backing map as desired per the <a * href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. *
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Aug 06 17:32:30 GMT 2025 - 9.8K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/ArrayTable.java
* guarantee that the new value will be fully visible to the other threads. To guarantee that * modifications are visible, synchronize access to the table. Unlike other {@code Table} * implementations, synchronization is unnecessary between a thread that writes to one cell and a * thread that reads from another. * * <p>See the Guava User Guide article on <a href=Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Aug 13 19:39:21 GMT 2025 - 26.2K bytes - Click Count (0) -
guava/src/com/google/common/collect/RangeMap.java
*/ // TODO(cpovirk): Consider documenting that IAE on the various methods that can throw it. RangeMap<K, V> subRangeMap(Range<K> range); /** * Returns {@code true} if {@code obj} is another {@code RangeMap} that has an equivalent {@link * #asMapOfRanges()}. */ @Override boolean equals(@Nullable Object o); /** Returns {@code asMapOfRanges().hashCode()}. */ @Override
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 7.6K bytes - Click Count (0) -
guava/src/com/google/common/collect/RegularImmutableBiMap.java
this.mask = mask; this.hashCode = hashCode; } // checkNoConflictInKeyBucket is static imported from RegularImmutableMap /** * @throws IllegalArgumentException if another entry in the bucket has the same key * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash * flooding attack */ private static void checkNoConflictInValueBucket(Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 22 21:07:18 GMT 2025 - 11K bytes - Click Count (0) -
internal/dsync/dsync-server_test.go
reply = true } else if reply = locksHeld != WriteLock; reply { // Unless there is a write lock l.lockMap[args.Resources[0]] = locksHeld + ReadLock // Grant another read lock } return reply, nil } func (l *lockServer) RUnlock(args *LockArgs) (reply bool, err error) { if d := atomic.LoadInt64(&l.responseDelay); d != 0 { time.Sleep(time.Duration(d)) }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 8.3K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/Cut.java
* use the `endpoint` field, compareTo() and endpoint(). Additionally, the main implementation * of Cut.compareTo checks for belowAll before reading accessing `endpoint` on another Cut * instance. */ super(""); } @Override Comparable<?> endpoint() { throw new IllegalStateException("range unbounded on this side"); }
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 22 18:35:44 GMT 2025 - 12.4K bytes - Click Count (0) -
guava/src/com/google/common/collect/ForwardingMultiset.java
import java.util.Collection; import java.util.Iterator; import java.util.Objects; import java.util.Set; import org.jspecify.annotations.Nullable; /** * A multiset which forwards all its method calls to another multiset. Subclasses should override * one or more methods to modify the behavior of the backing multiset as desired per the <a * href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. *
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 10.3K bytes - Click Count (0)