- Sort Score
- Num 10 results
- Language All
Results 481 - 490 of 632 for presence (0.06 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
tensorflow/c/c_api_experimental.h
TF_ImportGraphDefOptionsSetValidateColocationConstraints( TF_ImportGraphDefOptions* opts, unsigned char enable); // Load the library specified by library_filename and register the pluggable // device and related kernels present in that library. This function is not // supported on embedded on mobile and embedded platforms and will fail if // called. // // Pass "library_filename" to a platform-specific mechanism for dynamicallyCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Thu Apr 27 21:07:00 GMT 2023 - 15.1K bytes - Click Count (0) -
docs/fr/docs/_llm-test.md
* l’étiquette * le framework Web * le joker * retourner * valider //// //// tab | Info
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.8K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
<div class="termy"> ```console $ pip install pyjwt ---> 100% ``` </div> /// info | Informação Se você pretente utilizar algoritmos de assinatura digital como o RSA ou o ECDSA, você deve instalar a dependência da biblioteca de criptografia `pyjwt[crypto]`.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 11.6K bytes - Click Count (0) -
LICENSE
to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, ifCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Mon Jan 18 20:25:38 GMT 2016 - 25.8K bytes - Click Count (0) -
guava/src/com/google/common/collect/SortedLists.java
* list that compares as equal to the key. * * <p>This is equivalent to the behavior of {@link java.util.Collections#binarySearch(List, * Object)} when the key isn't present, since {@code ~insertionIndex} is equal to {@code -1 - * insertionIndex}. */ INVERTED_INSERTION_INDEX { @Override public int resultIndex(int higherIndex) { return ~higherIndex;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 10.9K bytes - Click Count (0) -
src/main/java/jcifs/smb/SpnegoContext.java
} private void verifyMechListMIC(final byte[] mechanismListMIC) throws CIFSException { if (this.disableMic) { return; } // No MIC verification if not present and not required // or if the chosen mechanism is our preferred one if ((mechanismListMIC == null || !this.mechContext.supportsIntegrity()) && this.requireMicCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 14.5K bytes - Click Count (0) -
src/test/java/jcifs/smb/SmbTreeConnectionTest.java
// No host connect attempted as we're already connected verify(c, never()).connectHost(any(), anyString()); } @Test @DisplayName("getSession returns null when no tree is present") void getSession_nullWhenNoTree() { SmbTreeConnection c = newConn(); assertNull(c.getSession()); }
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 13K bytes - Click Count (0) -
guava/src/com/google/common/base/Strings.java
* purpose except to supplant the real information you were trying to provide. These are the cases * this method is made for; it instead generates a best-effort string with all supplied argument * values present. This method is also useful in environments such as GWT where {@code * String.format} is not available. As an example, method implementations of the {@linkCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jan 29 22:14:05 GMT 2026 - 12.5K bytes - Click Count (0) -
guava/src/com/google/common/collect/MapMaker.java
* iterators never throw {@link ConcurrentModificationException}. * * <p>If {@link #weakKeys} or {@link #weakValues} are requested, it is possible for a key or value * present in the map to be reclaimed by the garbage collector. Entries with reclaimed keys or * values may be removed from the map on each map modification or on occasional map accesses; suchCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 12.8K bytes - Click Count (0) -
cmd/encryption-v1.go
func (o *MultipartInfo) KMSKeyID() string { return kmsKeyIDFromMetadata(o.UserDefined) } // kmsKeyIDFromMetadata returns any AWS S3 KMS key ID in the // metadata, if any. It returns an empty ID if no key ID is // present. func kmsKeyIDFromMetadata(metadata map[string]string) string { const ARNPrefix = crypto.ARNPrefix if len(metadata) == 0 { return "" } kmsID, ok := metadata[crypto.MetaKeyID] if !ok { return "" }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 38K bytes - Click Count (0)