- Sort Score
- Result 10 results
- Languages All
Results 571 - 580 of 658 for through (0.07 sec)
-
android/guava/src/com/google/common/collect/RegularImmutableMap.java
* save that if that location is already full, we try the next index, and the next, until we * find an empty table position. Since the table has a power-of-two size, we use * & (table.length - 1) instead of % table.length, though. */ private final transient @Nullable Object hashTable; @VisibleForTesting final transient @Nullable Object[] alternatingKeysAndValues; private final transient int size; /*
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22.5K bytes - Viewed (0) -
docs/en/docs/tutorial/body-nested-models.md
{* ../../docs_src/body_nested_models/tutorial009_py39.py hl[7] *} /// tip Keep in mind that JSON only supports `str` as keys. But Pydantic has automatic data conversion. This means that, even though your API clients can only send strings as keys, as long as those strings contain pure integers, Pydantic will convert them and validate them. And the `dict` you receive as `weights` will actually have `int` keys and `float` values.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.3K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/DirectedGraphConnections.java
* LinkedHashMap because one target node may be mapped to both a predecessor and a successor. A * LinkedHashMap combines two such edges into a single node-value pair, even though the edges may * not have been inserted consecutively. */ private final @Nullable List<NodeConnection<N>> orderedNodeConnections; private int predecessorCount; private int successorCount;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Jan 18 02:54:30 UTC 2025 - 17.8K bytes - Viewed (0) -
src/test/java/jcifs/pac/PacMacTest.java
verifyNfold("password", 7, new byte[] { (byte) 0x78, (byte) 0xa0, (byte) 0x7b, (byte) 0x6c, (byte) 0xaf, (byte) 0x85, (byte) 0xfa }); // 64-fold("Rough Consensus, and Running Code") verifyNfold("Rough Consensus, and Running Code", 8, new byte[] { (byte) 0xbb, (byte) 0x6e, (byte) 0xd3, (byte) 0x08, (byte) 0x70, (byte) 0xb7, (byte) 0xf0, (byte) 0xe0 }); // 64-fold("kerberos")
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* Returns true if this ACE is an inherited ACE and false if it is a direct ACE. * <p> * Note: For reasons not fully understood, <code>FLAGS_INHERITED</code> may * not be set within all security descriptors even though the ACE was in * face inherited. If an inherited ACE is added to a parent the Windows * ACL editor will rebuild all children ACEs and set this flag accordingly. * * @return whether this is an inherited ACE
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
docs/en/docs/tutorial/metadata.md
<img src="/img/tutorial/metadata/image02.png"> ### Order of tags { #order-of-tags } The order of each tag metadata dictionary also defines the order shown in the docs UI. For example, even though `users` would go after `items` in alphabetical order, it is shown before them, because we added their metadata as the first dictionary in the list. ## OpenAPI URL { #openapi-url }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5.9K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbNamedPipe.java
* * <pre> * new SmbNamedPipe("smb://server/IPC$/foo", SmbNamedPipe.PIPE_TYPE_RDWR, context); * </pre> * * </td> * <td> * Open the Named Pipe foo for reading and writing. The pipe will * behave as though the <code>CreateFile</code>, <code>ReadFile</code>, * <code>WriteFile</code>, and <code>CloseFile</code> interface was * being used. * </td> * </tr> * </table> * * <p>
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 6.2K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableMap.java
* values are merged using the specified merging function. If the merging function returns {@code * null}, then the collector removes the value that has been computed for the key thus far (though * future occurrences of the key would reinsert it). * * <p>Entries will appear in the encounter order of the first occurrence of the key. * * @since 21.0 */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 44.3K bytes - Viewed (0) -
src/main/webapp/css/admin/adminlte.min.css.map
flex-grow: 1;\n max-width: 100%;\n }\n\n @if $grid-row-columns > 0 {\n @for $i from 1 through $grid-row-columns {\n .row-cols#{$infix}-#{$i} {\n @include row-cols($i);\n }\n }\n }\n\n .col#{$infix}-auto {\n @include make-col-auto();\n }\n\n @if $columns > 0 {\n @for $i from 1 through $columns {\n .col#{$infix}-#{$i} {\n @include make-col($i, $columns);\n }\n }\n...
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 3.7M bytes - Viewed (1) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
/* * This still isn't quite right. If one npa object does not have external * hashes and the other does then they will not be considered equal even * though they may be. */ } return true; } return false; } /** * Check whether the password hashes are externally supplied. *
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.3K bytes - Viewed (0)