Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 43 for techniques (0.05 sec)

  1. src/main/java/jcifs/smb1/smb1/ServerMessageBlock.java

            return HEADER_LENGTH;
        }
    
        boolean isResponse() {
            return (flags & FLAGS_RESPONSE) == FLAGS_RESPONSE;
        }
    
        /*
         * For this packet deconstruction technique to work for
         * other networking protocols the InputStream may need
         * to be passed to the readXxxWireFormat methods. This is
         * actually purer. However, in the case of smb we know the
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 19.7K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/dependencies/dependencies-with-yield.md

    You can also use `except` to catch the exception that was raised and do something with it.
    
    For example, you can raise a different exception, like `HTTPException`.
    
    /// tip
    
    This is a somewhat advanced technique, and in most of the cases you won't really need it, as you can raise exceptions (including `HTTPException`) from inside of the rest of your application code, for example, in the *path operation function*.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 12.9K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/collect/MultimapBuilder.java

      /*
       * Leaving K and V as upper bounds rather than the actual key and value types allows type
       * parameters to be left implicit more often. CacheBuilder uses the same technique.
       */
    
      private MultimapBuilder() {}
    
      private static final int DEFAULT_EXPECTED_KEYS = 8;
    
      /** Uses a hash table to map keys to value collections. */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Sep 22 18:35:44 UTC 2025
    - 18K bytes
    - Viewed (0)
  4. guava/src/com/google/common/util/concurrent/Striped.java

     * to that of {@code ConcurrentHashMap} in a reusable form, and extends it for semaphores and
     * read-write locks. Conceptually, lock striping is the technique of dividing a lock into many
     * <i>stripes</i>, increasing the granularity of a single lock and allowing independent operations
     * to lock different stripes and proceed concurrently, instead of creating contention for a single
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 16 22:01:32 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  5. guava/src/com/google/common/math/LongMath.java

          // But in gcd(a - b, b), a - b is even and b is odd, so we can divide out powers of two.
    
          // We bend over backwards to avoid branching, adapting a technique from
          // http://graphics.stanford.edu/~seander/bithacks.html#IntegerMinOrMax
    
          long delta = a - b; // can't overflow, since a and b are nonnegative
    
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Nov 03 21:01:09 UTC 2025
    - 46.8K bytes
    - Viewed (0)
  6. okhttp/src/commonJvmAndroid/kotlin/okhttp3/Cache.kt

     * if (forceCacheResponse.code() != 504) {
     *   // The resource was cached! Show it.
     * } else {
     *   // The resource was not cached.
     * }
     * ```
     *
     * This technique works even better in situations where a stale response is better than no response.
     * To permit stale cached responses, use the `max-stale` directive with the maximum staleness in
     * seconds:
     *
     * ```java
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Oct 03 17:41:45 UTC 2025
    - 26.8K bytes
    - Viewed (0)
  7. src/main/java/jcifs/internal/smb1/ServerMessageBlock.java

         */
        protected boolean isResponse() {
            return (this.flags & SmbConstants.FLAGS_RESPONSE) == SmbConstants.FLAGS_RESPONSE;
        }
    
        /*
         * For this packet deconstruction technique to work for
         * other networking protocols the InputStream may need
         * to be passed to the readXxxWireFormat methods. This is
         * actually purer. However, in the case of smb we know the
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 38.9K bytes
    - Viewed (0)
  8. docs/en/docs/release-notes.md

    * ♻️ Refactor and simplify dependencies data structures with dataclasses. PR [#12098](https://github.com/fastapi/fastapi/pull/12098) by [@tiangolo](https://github.com/tiangolo).
    
    ### Docs
    
    * 📝 Add External Link: Techniques and applications of SQLAlchemy global filters in FastAPI. PR [#12109](https://github.com/fastapi/fastapi/pull/12109) by [@TheShubhendra](https://github.com/TheShubhendra).
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Dec 27 19:06:15 UTC 2025
    - 586.7K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb/SmbFile.java

             * the redirected target has different capabilities. But
             * the way we have been doing that is to call exists() which
             * calls this method so another technique will be necessary
             * to support DFS referral _to_ Win95/98/ME.
             */
    
            // Optimization: Prefer SMB2 approach for better performance
            if (th.isSMB2()) {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 103.2K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/SmbFile.java

             * the redirected target has different capabilities. But
             * the way we have been doing that is to call exists() which
             * calls this method so another technique will be necessary
             * to support DFS referral _to_ Win95/98/ME.
             */
    
            if (tree.session.transport.hasCapability(SmbConstants.CAP_NT_SMBS)) {
    
                /*
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 112.2K bytes
    - Viewed (0)
Back to top