- Sort Score
- Result 10 results
- Languages All
Results 371 - 380 of 883 for simple (0.04 sec)
-
docs/en/docs/deployment/concepts.md
But in most cases, you will want to perform these steps only **once**. So, you will want to have a **single process** to perform those **previous steps**, before starting the application.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/GeneratedMonitorTest.java
suite.addTest(new GeneratedMonitorTest(method, scenario, fair, null, expectedOutcome)); } } } } /** A guard that encapsulates a simple, mutable boolean flag. */ static class FlagGuard extends Monitor.Guard { private boolean satisfied; protected FlagGuard(Monitor monitor) { super(monitor); } @Override
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 27K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/math/IntMathTest.java
public void testLog10TrivialOnPowerOfTen() { int x = 1000000; for (RoundingMode mode : ALL_ROUNDING_MODES) { assertEquals(6, IntMath.log10(x, mode)); } } // Simple test to cover sqrt(0) for all types and all modes. @GwtIncompatible // sqrt public void testSqrtZeroAlwaysZero() { for (RoundingMode mode : ALL_ROUNDING_MODES) { assertEquals(0, IntMath.sqrt(0, mode));
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 24.1K bytes - Viewed (0) -
cmd/erasure-metadata.go
if metadata.Deleted || metadata.Size == 0 { parities[index] = totalShards / 2 } else if metadata.TransitionStatus == lifecycle.TransitionComplete { // For tiered objects, read quorum is N/2+1 to ensure simple majority on xl.meta. // It is not equal to EcM because the data integrity is entrusted with the warm tier. // However, we never go below EcM, in case of a EcM=EcN setup.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 21.3K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Monitor.java
* } * } else { * // do other things since the monitor was not available * } * } * * <h2>Comparison with {@code synchronized} and {@code ReentrantLock}</h2> * * <p>The following examples show a simple threadsafe holder expressed using {@code synchronized}, * {@link ReentrantLock}, and {@code Monitor}. * * <h3>{@code synchronized}</h3> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 42.8K bytes - Viewed (0) -
src/bytes/bytes_test.go
} } if len(old) == 0 && n != 0 { out.Write(new) } return out.Bytes() } if simple, replace := differentImpl(in, old, new, n), Replace(in, old, new, n); !slices.Equal(simple, replace) { t.Errorf("The two implementations do not match %q != %q for Replace(%q, %q, %q, %d)", simple, replace, in, old, new, n) } }) } func BenchmarkReplace(b *testing.B) {
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon Jul 28 18:13:58 UTC 2025 - 62.9K bytes - Viewed (0) -
cmd/metacache-entries.go
dirMatches := best.isDir() == other.isDir() suffixMatches := strings.HasSuffix(best.name, slashSeparator) == strings.HasSuffix(other.name, slashSeparator) // Simple case. Both are same type with same suffix. if dirMatches && suffixMatches { toMerge = append(toMerge, otherIdx) continue } if !dirMatches {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 08 15:29:58 UTC 2024 - 24.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/LinkedListMultimap.java
private transient int size; /* * Tracks modifications to keyToKeyList so that addition or removal of keys invalidates * preexisting iterators. This does *not* track simple additions and removals of values * that are not the first to be added or last to be removed for their key. */ private transient int modCount;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 26.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 25.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
she would keep, through all her riper years, the simple and loving heart of her childhood: and how she would gather about her other little children, and make THEIR eyes bright and eager with many a strange tale, perhaps even with the dream of Wonderland of long ago: and how she would feel with all their simple sorrows, and find a pleasure in all their simple joys, remembering her own child-life, and the happy summer days.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Apr 21 02:27:51 UTC 2017 - 145.2K bytes - Viewed (0)