Search Options

Results per page
Sort
Preferred Languages
Advance

Results 481 - 490 of 658 for samples (0.04 sec)

  1. docs/pt/docs/advanced/security/oauth2-scopes.md

    E nós retornamos os escopos como parte do token JWT.
    
    /// danger | Cuidado
    
    Para manter as coisas simples, aqui nós estamos apenas adicionando os escopos recebidos diretamente ao token.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 14.9K bytes
    - Viewed (0)
  2. cmd/metacache-entries.go

    	defer xioutil.SafeClose(out)
    	top := make([]*metaCacheEntry, len(in))
    	nDone := 0
    	ctxDone := ctx.Done()
    
    	// Use simpler forwarder.
    	if len(in) == 1 {
    		for {
    			select {
    			case <-ctxDone:
    				return ctx.Err()
    			case v, ok := <-in[0]:
    				if !ok {
    					return nil
    				}
    				select {
    				case <-ctxDone:
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Aug 08 15:29:58 UTC 2024
    - 24.1K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     *       at this goal. Important note: it may be easy to achieve the theoretical minimum collision
     *       rate when using completely <i>random</i> sample input. The true test of a hash function is
     *       how it performs on representative real-world data, which tends to contain many hidden
     *       patterns and clumps. The goal of a good hash function is to stamp these patterns out as
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       at this goal. Important note: it may be easy to achieve the theoretical minimum collision
     *       rate when using completely <i>random</i> sample input. The true test of a hash function is
     *       how it performs on representative real-world data, which tends to contain many hidden
     *       patterns and clumps. The goal of a good hash function is to stamp these patterns out as
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. docs/es/docs/alternatives.md

    Esta simplicidad y flexibilidad permiten hacer cosas como usar bases de datos NoSQL como el sistema de almacenamiento de datos principal.
    
    Como es muy simple, es relativamente intuitivo de aprender, aunque la documentación se vuelve algo técnica en algunos puntos.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 10:15:01 UTC 2025
    - 25.9K bytes
    - Viewed (0)
  6. src/test/java/jcifs/smb/SmbTreeHandleImplTest.java

        }
    
        @Test
        @DisplayName("Constructor acquires tree connection; getConfig/isConnected delegate")
        void constructorAndSimpleDelegations() {
            // Ensures constructor acquires tree connection and simple delegate methods forward correctly
            // Verify constructor invoked acquire once
            verify(treeConnection, times(1)).acquire();
    
            // getConfig delegates
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 14.4K bytes
    - Viewed (0)
  7. guava/src/com/google/common/net/InetAddresses.java

     * {@code InetAddress.getAddress()}) they are 4 and 16 bytes in length, respectively, and represent
     * the address in network byte order.
     *
     * <p>Examples of IP addresses and their byte representations:
     *
     * <dl>
     *   <dt>The IPv4 loopback address, {@code "127.0.0.1"}.
     *   <dd>{@code 7f 00 00 01}
     *   <dt>The IPv6 loopback address, {@code "::1"}.
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  8. docs/en/docs/advanced/advanced-dependencies.md

    {* ../../docs_src/dependencies/tutorial011_an_py39.py hl[22] *}
    
    /// tip
    
    All this might seem contrived. And it might not be very clear how is it useful yet.
    
    These examples are intentionally simple, but show how it all works.
    
    In the chapters about security, there are utility functions that are implemented in this same way.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Thu Nov 13 07:37:15 UTC 2025
    - 9.1K bytes
    - Viewed (0)
  9. guava-testlib/src/com/google/common/collect/testing/features/CollectionFeature.java

    @GwtCompatible
    public enum CollectionFeature implements Feature<Collection> {
      /**
       * The collection must not throw {@code NullPointerException} on calls such as {@code
       * contains(null)} or {@code remove(null)}, but instead must return a simple {@code false}.
       */
      ALLOWS_NULL_QUERIES,
      ALLOWS_NULL_VALUES(ALLOWS_NULL_QUERIES),
    
      /**
       * Indicates that a collection disallows certain elements (other than {@code null}, whose validity
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  10. src/main/java/org/codelibs/fess/opensearch/config/cbean/ca/bs/BsScheduledJobCA.java

    import org.opensearch.search.aggregations.bucket.range.IpRangeAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.range.RangeAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.sampler.SamplerAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.terms.SignificantTermsAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.terms.TermsAggregationBuilder;
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Sat Mar 15 06:53:53 UTC 2025
    - 89.1K bytes
    - Viewed (0)
Back to top