Search Options

Results per page
Sort
Preferred Languages
Advance

Results 541 - 550 of 973 for sucht (0.03 sec)

  1. docs/bucket/lifecycle/DESIGN.md

    ### Expiry or removal events
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 4.3K bytes
    - Viewed (0)
  2. okhttp/src/main/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinder.kt

            }
          }
        } finally {
          cancelInFlightConnects()
        }
    
        throw firstException!!
      }
    
      /**
       * Returns non-null if we don't need to wait for the launched result. In such cases, this result
       * must be processed before whatever is waiting in the queue because we may have already acquired
       * its connection.
       */
      private fun launchTcpConnect(): ConnectResult? {
        val plan =
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/math/DoubleUtils.java

        return getExponent(d) <= MAX_EXPONENT;
      }
    
      static boolean isNormal(double d) {
        return getExponent(d) >= MIN_EXPONENT;
      }
    
      /*
       * Returns x scaled by a power of 2 such that it is in the range [1, 2). Assumes x is positive,
       * normal, and finite.
       */
      static double scaleNormalize(double x) {
        long significand = doubleToRawLongBits(x) & SIGNIFICAND_MASK;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/hash/HashFunction.java

     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/HashFunction.java

     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  6. guava-testlib/src/com/google/common/testing/FreshValueGenerator.java

      @SuppressWarnings("rawtypes") // TreeBasedTable.create() is defined as such
      @Generates
      static <R extends Comparable, C extends Comparable, V>
          RowSortedTable<R, C, V> generateRowSortedTable(R row, C column, V value) {
        return generateTreeBasedTable(row, column, value);
      }
    
      @SuppressWarnings("rawtypes") // TreeBasedTable.create() is defined as such
      @Generates
      static <R extends Comparable, C extends Comparable, V>
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 28.7K bytes
    - Viewed (0)
  7. build-logic/documentation/src/main/groovy/gradlebuild/docs/FindBrokenInternalLinks.java

            fw.println("# The checker does not handle implicit section names, so they must be explicit and declared as: [[section-name]]");
            fw.println("#");
            fw.println("# The checker also rejects Markdown-style links, such as [text](https://example.com/something) as they do not render properly");
    
        }
    
        private void gatherDeadLinksInFile(File sourceFile, Map<File, List<Error>> errors) {
            int lineNumber = 0;
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Wed Aug 21 08:08:05 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  8. docs/changelogs/changelog_3x.md

        `requestBodyEnd()`, both on the same call. Such events may be triggered by different threads
        even for a single call.
    
        Interceptors that rewrite or replace the request body may now inadvertently interfere with
        duplex request bodies. Such interceptors should check `RequestBody.isDuplex()` and avoid
        accessing the request body when it is.
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Feb 06 14:55:54 UTC 2022
    - 50.8K bytes
    - Viewed (0)
  9. cmd/speedtest.go

    				// - practically speaking this never happens
    				// and should never happen - however it has
    				// been seen recently due to hardware issues
    				// causes Reads() to go slower than Writes().
    				//
    				// Send such results anyways as this shall
    				// expose a problem underneath.
    				if totalPut > throughputHighestPut {
    					throughputHighestResults = results
    					throughputHighestPut = totalPut
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon May 06 09:45:10 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/Multisets.java

       * an {@link IllegalArgumentException}. When methods such as {@code removeAll()} and {@code
       * clear()} are called on the filtered multiset, only elements that satisfy the filter will be
       * removed from the underlying multiset.
       *
       * <p>The returned multiset isn't threadsafe or serializable, even if {@code unfiltered} is.
       *
       * <p>Many of the filtered multiset's methods, such as {@code size()}, iterate across every
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 41.7K bytes
    - Viewed (0)
Back to top