Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 116 for low (0.01 sec)

  1. src/main/java/jcifs/smb1/smb1/ServerMessageBlock.java

            dst[++dstIndex] = (byte) (val >> 8);
        }
    
        static long readTime(final byte[] src, final int srcIndex) {
            final int low = readInt4(src, srcIndex);
            final int hi = readInt4(src, srcIndex + 4);
            final long t = (long) hi << 32L | low & 0xFFFFFFFFL;
            return t / 10000L - MILLISECONDS_BETWEEN_1970_AND_1601;
        }
    
        static void writeTime(long t, final byte[] dst, final int dstIndex) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 19.7K bytes
    - Viewed (0)
  2. docs/de/docs/advanced/path-operation-advanced-configuration.md

    Dieses *Pfadoperation*-spezifische OpenAPI-Schema wird normalerweise automatisch von **FastAPI** generiert, Sie können es aber auch erweitern.
    
    /// tip | Tipp
    
    Dies ist ein Low-Level Erweiterungspunkt.
    
    Wenn Sie nur zusätzliche Responses deklarieren müssen, können Sie dies bequemer mit [Zusätzliche Responses in OpenAPI](additional-responses.md){.internal-link target=_blank} tun.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. src/test/java/jcifs/internal/smb1/AndXServerMessageBlockTest.java

            };
            byte[] buffer = new byte[1024];
    
            // Setup buffer after header
            buffer[33] = 4; // wordCount
            buffer[34] = (byte) 0xFF; // andxCommand
            buffer[36] = 0; // andxOffset low
            buffer[37] = 0; // andxOffset high
            SMBUtil.writeInt2(20, buffer, 42); // byteCount
    
            int length = testBlock.decode(buffer, 0);
    
            assertTrue(length > 0);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 19.4K bytes
    - Viewed (0)
  4. src/test/java/jcifs/internal/smb2/lease/LeaseManagerTest.java

            }
        }
    
        @Test
        @DisplayName("Should evict oldest leases when max limit reached")
        void testMaxLeaseEviction() throws InterruptedException {
            // Create a context with low max lease limit
            Configuration limitedConfig = mock(Configuration.class);
            CIFSContext limitedContext = mock(CIFSContext.class);
            when(limitedContext.getConfig()).thenReturn(limitedConfig);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 21 00:16:17 UTC 2025
    - 13.2K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    she stood watching them, and he checked himself suddenly:  the
    others looked round also, and all of them bowed low.
    
      `Would you tell me,' said Alice, a little timidly, `why you are
    painting those roses?'
    
      Five and Seven said nothing, but looked at Two.  Two began in a
    low voice, `Why the fact is, you see, Miss, this here ought to
    have been a RED rose-tree, and we put a white one in by mistake;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb2/multichannel/ChannelLoadBalancer.java

                }
                return maxBandwidthChannel != null ? maxBandwidthChannel : channels.iterator().next();
            }
    
            if (isMetadataOperation(message)) {
                // For metadata operations, prefer low-latency channels
                return selectLeastLoaded(channels);
            }
    
            // Default to weighted random for general operations
            return selectWeightedRandom(channels);
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  7. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnection.kt

     * by holding a lock on the connection.
     */
    class RealConnection internal constructor(
      val taskRunner: TaskRunner,
      val connectionPool: RealConnectionPool,
      override val route: Route,
      /** The low-level TCP socket. */
      private val rawSocket: JavaNetSocket,
      /**
       * The application layer socket. Either an [SSLSocket] layered over [rawSocket], or [rawSocket]
       * itself if this connection does not use SSL.
       */
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Thu Jul 31 04:18:40 UTC 2025
    - 14.9K bytes
    - Viewed (0)
  8. src/cmd/cgo/ast.go

    		f.walk(&n.X, ctxSelector, visit)
    	case *ast.IndexExpr:
    		f.walk(&n.X, ctxExpr, visit)
    		f.walk(&n.Index, ctxExpr, visit)
    	case *ast.SliceExpr:
    		f.walk(&n.X, ctxExpr, visit)
    		if n.Low != nil {
    			f.walk(&n.Low, ctxExpr, visit)
    		}
    		if n.High != nil {
    			f.walk(&n.High, ctxExpr, visit)
    		}
    		if n.Max != nil {
    			f.walk(&n.Max, ctxExpr, visit)
    		}
    	case *ast.TypeAssertExpr:
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon Oct 14 15:47:06 UTC 2024
    - 14.3K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/cache/Striped64.java

       * and because threads are typically not bound to CPUS forever,
       * may not occur at all. However, despite these limitations,
       * observed contention rates are typically low in these cases.
       *
       * It is possible for a Cell to become unused when threads that
       * once hashed to it terminate, as well as in the case where
       * doubling the table causes no thread to hash to it under
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Jan 15 22:17:15 UTC 2025
    - 11.4K bytes
    - Viewed (0)
  10. SECURITY.md

    functions](https://www.tensorflow.org/guide/create_op#define_the_op_interface)
    are skipped, and any checks implemented inside the shape inference code are not
    executed.
    
    The security impact of skipping those checks should be low, since the attack
    scenario would require a malicious user to be able to control the model which as
    stated above is already equivalent to code execution. In any case, the
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
Back to top