Search Options

Results per page
Sort
Preferred Languages
Advance

Results 271 - 280 of 489 for compares (0.05 sec)

  1. android/guava/src/com/google/common/hash/Fingerprint2011.java

     * for information on the behaviour of the algorithm.
     *
     * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to
     * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds.
     *
     * <p>Note to maintainers: This implementation relies on signed arithmetic being bit-wise equivalent
     * to unsigned arithmetic in all cases except:
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  2. compat/maven-compat/src/main/java/org/apache/maven/artifact/ArtifactStatus.java

        }
    
        @Override
        public int hashCode() {
            return rank;
        }
    
        @Override
        public String toString() {
            return key;
        }
    
        @Override
        public int compareTo(ArtifactStatus s) {
            return rank - s.rank;
        }
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 3K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/generate-clients.md

    This section highlights **venture-backed** and **company-supported** solutions from companies that sponsor FastAPI. These products provide **additional features** and **integrations** on top of high-quality generated SDKs.
    
    By ✨ [**sponsoring FastAPI**](../help-fastapi.md#sponsor-the-author){.internal-link target=_blank} ✨, these companies help ensure the framework and its **ecosystem** remain healthy and **sustainable**.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 10.1K bytes
    - Viewed (1)
  4. compat/maven-compat/src/main/java/org/apache/maven/repository/metadata/DefaultClasspathTransformation.java

                            if (e2.getPomOrder() == e1.getPomOrder()) {
                                return e1.getTarget()
                                        .toString()
                                        .compareTo(e2.getTarget().toString());
                            }
                            return e2.getPomOrder() - e1.getPomOrder();
                        }
                        return e2.getDepth() - e1.getDepth();
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Wed Jul 23 17:27:08 UTC 2025
    - 5.1K bytes
    - Viewed (0)
  5. api/maven-api-core/src/main/java/org/apache/maven/api/SessionData.java

        <T> void set(@Nonnull Key<T> key, @Nullable T value);
    
        /**
         * Associates the specified session data with the given key if the key is currently mapped to the given value. This
         * method provides an atomic compare-and-update of some key's value.
         *
         * @param key the key under which to store the session data, must not be {@code null}
         * @param oldValue the expected data currently associated with the key, may be {@code null}
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Wed Feb 28 23:31:09 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  6. android/guava-tests/test/com/google/common/primitives/CharsTest.java

      public void testCompare() {
        for (char x : VALUES) {
          for (char y : VALUES) {
            assertWithMessage(x + ", " + y)
                .that(Math.signum(Chars.compare(x, y)))
                .isEqualTo(Math.signum(Character.compare(x, y)));
          }
        }
      }
    
      public void testContains() {
        assertThat(Chars.contains(EMPTY, (char) 1)).isFalse();
        assertThat(Chars.contains(ARRAY1, (char) 2)).isFalse();
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 25.9K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/reflect/TypeResolver.java

             * Android), the built-in TypeVariable's equals() method doesn't recognize instances of our
             * TypeVariable implementation. This is a problem because users compare TypeVariables from
             * the JDK against TypeVariables returned by TypeResolver. To work with all JDK versions,
             * TypeResolver must return the appropriate TypeVariable implementation in each of the three
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Sep 03 14:03:14 UTC 2025
    - 24.2K bytes
    - Viewed (0)
  8. cmd/bitrot.go

    			return errFileCorrupt
    		}
    		return nil
    	}
    
    	h := algo.New()
    	hashBuf := make([]byte, h.Size())
    	left := wantSize
    
    	// Calculate the size of the bitrot file and compare
    	// it with the actual file size.
    	if left != bitrotShardFileSize(partSize, shardSize, algo) {
    		return errFileCorrupt
    	}
    
    	bufp := xioutil.ODirectPoolSmall.Get()
    	defer xioutil.ODirectPoolSmall.Put(bufp)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 19:26:13 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  9. guava/src/com/google/common/math/LongMath.java

        if (roundArbitrarilyAsLong == Long.MAX_VALUE) {
          /*
           * For most values, the conversion from roundArbitrarily to roundArbitrarilyAsLong is
           * lossless. In that case we can compare x to roundArbitrarily using Long.compare(x,
           * roundArbitrarilyAsLong). The exception is for values where the conversion to double rounds
           * up to give roundArbitrarily equal to 2^63, so the conversion back to long overflows and
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Aug 29 16:20:07 UTC 2025
    - 46.8K bytes
    - Viewed (0)
  10. src/main/java/jcifs/internal/dtyp/ACE.java

     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
Back to top