- Sort Score
- Num 10 results
- Language All
Results 531 - 540 of 1,145 for nature (0.04 seconds)
-
guava-testlib/src/com/google/common/collect/testing/NavigableMapTestSuiteBuilder.java
import com.google.common.collect.testing.DerivedCollectionGenerators.SortedMapSubmapTestMapGenerator; import com.google.common.collect.testing.features.Feature; import com.google.common.collect.testing.testers.NavigableMapNavigationTester; import java.util.ArrayList; import java.util.List; import java.util.Map; import java.util.Map.Entry; import java.util.NavigableMap;
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 7K bytes - Click Count (0) -
docs/tr/docs/advanced/websockets.md
WebSockets kullanarak backend'inizle iletişim kurmak için de büyük ihtimalle frontend'inizin sağladığı yardımcı araçları kullanırsınız. Ya da native kod ile doğrudan WebSocket backend'inizle iletişim kuran native bir mobil uygulamanız olabilir. Veya WebSocket endpoint'i ile iletişim kurmak için başka herhangi bir yönteminizi de kullanıyor olabilirsiniz. ---
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 5.9K bytes - Click Count (0) -
cmd/sts-datatypes.go
// strongly recommend that you make no assumptions about the maximum size. As // of this writing, the typical size is less than 4096 bytes, but that can vary. // Also, future updates to AWS might require larger sizes. Credentials auth.Credentials `xml:",omitempty"` // A percentage value that indicates the size of the policy in packed form.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 9.9K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/BloomFilter.java
/** The strategy we employ to map an element T to {@code numHashFunctions} bit indexes. */ private final Strategy strategy; /** Natural logarithm of 2, used to optimize calculations in Bloom filter sizing. */ private static final double LOG_TWO = Math.log(2); /** Square of the natural logarithm of 2, reused to optimize the bit size calculation. */ private static final double SQUARED_LOG_TWO = LOG_TWO * LOG_TWO;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Mar 10 22:28:12 GMT 2026 - 27.6K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/TreeRangeSet.java
return subMap(Range.downTo(fromKey, BoundType.forBoolean(inclusive))); } @Override public Comparator<? super Cut<C>> comparator() { return Ordering.natural(); } @Override public boolean containsKey(@Nullable Object key) { return get(key) != null; } @Override public @Nullable Range<C> get(@Nullable Object key) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 23 17:50:58 GMT 2025 - 32.3K bytes - Click Count (0) -
futures/failureaccess/src/module-info.java
* or implied. See the License for the specific language governing permissions and limitations under * the License. */ /** Guava: {@code Future} Internals. */ module com.google.common.util.concurrent.internal { exports com.google.common.util.concurrent.internal;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Feb 12 18:13:11 GMT 2025 - 744 bytes - Click Count (0) -
cmd/bucket-listobjects-handlers.go
return checkRequestAuthType(ctx, r, action, bucket, name) } } urlValues := r.Form // Extract all the listBucketVersions query params to their native values. prefix, marker, delimiter, maxkeys, encodingType, versionIDMarker, errCode := getListBucketObjectVersionsArgs(urlValues) if errCode != ErrNone { writeErrorResponse(ctx, w, errorCodes.ToAPIErr(errCode), r.URL)
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 11.6K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/mylasta/mail/CrawlerPostcardTest.java
@Test public void test_basicAssertion() { assertTrue(true); assertFalse(false); assertNotNull("test"); assertEquals(1, 1); } // Test placeholder for future implementation @Test public void test_placeholder() { // This test verifies the test class can be instantiated and run String testValue = "test"; assertNotNull(testValue);Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 1.6K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/oauth2-jwt.md
Par exemple, vous pourriez l'utiliser pour lire et vérifier des mots de passe générés par un autre système (comme Django), mais hacher tous les nouveaux mots de passe avec un autre algorithme comme Argon2 ou Bcrypt. Et rester compatible avec tous en même temps. /// Créez une fonction utilitaire pour hacher un mot de passe fourni par l'utilisateur. Et une autre pour vérifier si un mot de passe reçu correspond au hachage stocké.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.6K bytes - Click Count (0) -
docs/fr/docs/tutorial/body-nested-models.md
De cette façon, vous n'avez pas besoin de savoir à l'avance quels sont les noms de champs/attributs valides (comme ce serait le cas avec des modèles Pydantic). Cela serait utile si vous voulez recevoir des clés que vous ne connaissez pas à l'avance. --- Un autre cas utile est lorsque vous souhaitez avoir des clés d'un autre type (par exemple `int`).
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 7.8K bytes - Click Count (0)