- Sort Score
- Result 10 results
- Languages All
Results 361 - 370 of 427 for consistent (0.21 sec)
-
CHANGELOG/CHANGELOG-1.21.md
...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Fri Oct 14 07:03:14 UTC 2022 - 367.3K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/ImmutableTableTest.java
table.put('b', 1, "bar"); table.put('a', 2, "baz"); validateTableCopies(table); // Even though rowKeySet, columnKeySet, and cellSet have the same // iteration ordering, row has an inconsistent ordering. assertThat(table.row('b').keySet()).containsExactly(1, 2).inOrder(); assertThat(ImmutableTable.copyOf(table).row('b').keySet()).containsExactly(2, 1).inOrder(); }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 18.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/Table.java
* update the underlying table, and vice versa. The cell set does not support the {@code add} or * {@code addAll} methods. * * @return set of table cells consisting of row key / column key / value triplets */ Set<Cell<R, C, V>> cellSet(); /** * Returns a set of row keys that have one or more values in the table. Changes to the set will
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Jun 17 14:40:53 UTC 2023 - 10.7K bytes - Viewed (0) -
cmd/local-locker.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 24 10:24:01 UTC 2024 - 10.7K bytes - Viewed (0) -
tensorflow/c/eager/parallel_device/parallel_device_lib.h
TFE_TensorHandle* tensor, TF_Status* status) const; // Construct a parallel tensor consisting of the scalar values from `values`. template <typename DataType> std::unique_ptr<ParallelTensor> ScalarsFromSequence( absl::Span<const DataType> values, TFE_Context* context, TF_Status* status) const;
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Mon Oct 21 04:14:14 UTC 2024 - 13.1K bytes - Viewed (0) -
src/cmd/asm/internal/arch/arm64.go
if !ok { return false } prog.Scond = bits return true } // parseARM64Suffix parses the suffix attached to an ARM64 instruction. // The input is a single string consisting of period-separated condition // codes, such as ".P.W". An initial period is ignored. func parseARM64Suffix(cond string) (uint8, bool) { if cond == "" { return 0, true }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Thu Sep 29 09:04:58 UTC 2022 - 10.4K bytes - Viewed (0) -
src/cmd/asm/internal/asm/parse.go
if name != "PC" && a.Name == obj.NAME_NONE { p.errorf("cannot reference %s without a symbol", name) } p.setPseudoRegister(a, name, false, prefix) return } a.Reg = r1 if r2 != 0 { // TODO: Consistency in the encoding would be nice here. if p.arch.InFamily(sys.ARM, sys.ARM64) { // Special form // ARM: destination register pair (R1, R2). // ARM64: register pair (R1, R2) for LDP/STP.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Wed Sep 04 18:16:59 UTC 2024 - 36.9K bytes - Viewed (0) -
docs/bucket/replication/DESIGN.md
replication status is reflected as `PENDING`. If 3 or more targets are participating in active-active replication, the replication configuration for replica metadata sync, delete marker replication and delete replication should match to avoid inconsistent picture between the clusters. It is not recommended to turn on asymmetric replication - for e.g. if three sites A,B,C are participating in replication, it would be better to avoid replication setups like A -> [B, C], B -> A. In this particular...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 14.7K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0)