- Sort Score
- Num 10 results
- Language All
Results 421 - 430 of 458 for Compare (0.12 seconds)
-
android/guava/src/com/google/common/util/concurrent/AtomicDoubleArray.java
* java.util.concurrent.atomic} package specification for description of the properties of atomic * variables. * * <p><a id="bitEquals"></a>This class compares primitive {@code double} values in methods such as * {@link #compareAndSet} by comparing their bitwise representation using {@link * Double#doubleToRawLongBits}, which differs from both the primitive double {@code ==} operator and
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jan 29 22:14:05 GMT 2026 - 8.1K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/collect/PeekingIteratorTest.java
*/ @SuppressWarnings("serial") // No serialization is used in this test @GwtCompatible @NullMarked public class PeekingIteratorTest extends TestCase { /** * Version of {@link IteratorTester} that compares an iterator over a given collection of elements * (used as the reference iterator) against a {@code PeekingIterator} that *wraps* such an * iterator (used as the target iterator). *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 23 17:50:58 GMT 2025 - 8.5K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/IntervalControlHelper.java
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Nov 23 12:34:02 GMT 2025 - 10K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0) -
cmd/xl-storage-meta-inline.go
in := x.afterVersion() sz, buf, _ := msgp.ReadMapHeaderBytes(in) newKeys := make([][]byte, 0, sz) newVals := make([][]byte, 0, sz) var removeKey func(s []byte) bool // Copy if big number of compares... if len(keys) > 5 && sz > 5 { mKeys := make(map[string]struct{}, len(keys)) for _, key := range keys { mKeys[key] = struct{}{} } removeKey = func(s []byte) bool { _, ok := mKeys[string(s)]
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 9.4K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/MapMaker.java
* be quickly garbage-collected before they are ever accessed. * * <p>{@code new MapMaker().weakKeys().makeMap()} is a recommended replacement for {@link * java.util.WeakHashMap}, but note that it compares keys using object identity whereas {@code * WeakHashMap} uses {@link Object#equals}. * * @author Bob Lee * @author Charles Fry * @author Kevin Bourrillion * @since 2.0 */ @J2ktIncompatibleCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 12.8K bytes - Click Count (0) -
guava/src/com/google/common/collect/CompactLinkedHashMap.java
* function doing a good job of distributing the elements to the buckets to a distribution not far * from uniform), and amortized since some operations can trigger a hash table resize. * * <p>As compared with {@link java.util.LinkedHashMap}, this structure places significantly reduced * load on the garbage collector by only using a constant number of internal objects. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 10.2K bytes - Click Count (0) -
src/main/java/jcifs/netbios/NbtAddress.java
*/ @Override public int hashCode() { return this.address; } /** * Determines if this address is equal two another. Only the IP Addresses * are compared. Similar to the {@link #hashCode} method, the comparison * is based on the integer IP address and not the string representation. */ @Override public boolean equals(final Object obj) {Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 15.1K bytes - Click Count (0) -
misc/cgo/gmp/gmp.go
func (z *Int) Abs(x *Int) *Int { x.doinit() z.doinit() C.mpz_abs(&z.i[0], &x.i[0]) return z } /* * functions without a clear receiver */ // CmpInt compares x and y. The result is // // -1 if x < y // 0 if x == y // +1 if x > y func CmpInt(x, y *Int) int { x.doinit() y.doinit() switch cmp := C.mpz_cmp(&x.i[0], &y.i[0]); { case cmp < 0:
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon Apr 11 16:34:30 GMT 2022 - 9.5K bytes - Click Count (0)