- Sort Score
- Result 10 results
- Languages All
Results 271 - 280 of 489 for compares (0.05 sec)
-
android/guava/src/com/google/common/hash/Fingerprint2011.java
* for information on the behaviour of the algorithm. * * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. * * <p>Note to maintainers: This implementation relies on signed arithmetic being bit-wise equivalent * to unsigned arithmetic in all cases except: *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/artifact/ArtifactStatus.java
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Jun 06 14:28:57 UTC 2025 - 3K bytes - Viewed (0) -
docs/en/docs/advanced/generate-clients.md
This section highlights **venture-backed** and **company-supported** solutions from companies that sponsor FastAPI. These products provide **additional features** and **integrations** on top of high-quality generated SDKs. By ✨ [**sponsoring FastAPI**](../help-fastapi.md#sponsor-the-author){.internal-link target=_blank} ✨, these companies help ensure the framework and its **ecosystem** remain healthy and **sustainable**.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 10.1K bytes - Viewed (1) -
compat/maven-compat/src/main/java/org/apache/maven/repository/metadata/DefaultClasspathTransformation.java
if (e2.getPomOrder() == e1.getPomOrder()) { return e1.getTarget() .toString() .compareTo(e2.getTarget().toString()); } return e2.getPomOrder() - e1.getPomOrder(); } return e2.getDepth() - e1.getDepth();
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Jul 23 17:27:08 UTC 2025 - 5.1K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/SessionData.java
<T> void set(@Nonnull Key<T> key, @Nullable T value); /** * Associates the specified session data with the given key if the key is currently mapped to the given value. This * method provides an atomic compare-and-update of some key's value. * * @param key the key under which to store the session data, must not be {@code null} * @param oldValue the expected data currently associated with the key, may be {@code null}
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Feb 28 23:31:09 UTC 2024 - 4.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/primitives/CharsTest.java
public void testCompare() { for (char x : VALUES) { for (char y : VALUES) { assertWithMessage(x + ", " + y) .that(Math.signum(Chars.compare(x, y))) .isEqualTo(Math.signum(Character.compare(x, y))); } } } public void testContains() { assertThat(Chars.contains(EMPTY, (char) 1)).isFalse(); assertThat(Chars.contains(ARRAY1, (char) 2)).isFalse();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 25.9K bytes - Viewed (0) -
android/guava/src/com/google/common/reflect/TypeResolver.java
* Android), the built-in TypeVariable's equals() method doesn't recognize instances of our * TypeVariable implementation. This is a problem because users compare TypeVariables from * the JDK against TypeVariables returned by TypeResolver. To work with all JDK versions, * TypeResolver must return the appropriate TypeVariable implementation in each of the three
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Sep 03 14:03:14 UTC 2025 - 24.2K bytes - Viewed (0) -
cmd/bitrot.go
return errFileCorrupt } return nil } h := algo.New() hashBuf := make([]byte, h.Size()) left := wantSize // Calculate the size of the bitrot file and compare // it with the actual file size. if left != bitrotShardFileSize(partSize, shardSize, algo) { return errFileCorrupt } bufp := xioutil.ODirectPoolSmall.Get() defer xioutil.ODirectPoolSmall.Put(bufp)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 19:26:13 UTC 2025 - 7.7K bytes - Viewed (0) -
guava/src/com/google/common/math/LongMath.java
if (roundArbitrarilyAsLong == Long.MAX_VALUE) { /* * For most values, the conversion from roundArbitrarily to roundArbitrarilyAsLong is * lossless. In that case we can compare x to roundArbitrarily using Long.compare(x, * roundArbitrarilyAsLong). The exception is for values where the conversion to double rounds * up to give roundArbitrarily equal to 2^63, so the conversion back to long overflows andRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 29 16:20:07 UTC 2025 - 46.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0)