Search Options

Results per page
Sort
Preferred Languages
Advance

Results 661 - 670 of 1,081 for nach (0.03 sec)

  1. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/AbstractStringBasedModelInterpolator.java

            }
    
            return model;
        }
    
        /**
         * Interpolates all expressions in the src parameter.
         * <p>
         * The algorithm used for each expression is:
         * <ul>
         *   <li>If it starts with either "pom." or "project.", the expression is evaluated against the model.</li>
         *   <li>If the value is null, get the value from the context.</li>
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 13.6K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/body-nested-models.md

    And whenever you output that data, even if the source had duplicates, it will be output as a set of unique items.
    
    And it will be annotated / documented accordingly too.
    
    ## Nested Models { #nested-models }
    
    Each attribute of a Pydantic model has a type.
    
    But that type can itself be another Pydantic model.
    
    So, you can declare deeply nested JSON "objects" with specific attribute names, types and validations.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.3K bytes
    - Viewed (0)
  3. cmd/erasure-coding.go

    			failOnErr(err)
    			encoded, err := e.EncodeData(GlobalContext, testData[:])
    			failOnErr(err)
    			hash := xxhash.New()
    			for i, data := range encoded {
    				// Write index to keep track of sizes of each.
    				_, err = hash.Write([]byte{byte(i)})
    				failOnErr(err)
    				_, err = hash.Write(data)
    				failOnErr(err)
    				got[conf] = map[ErasureAlgo]uint64{algo: hash.Sum64()}
    			}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/curl/Curl.java

     */
    package org.codelibs.curl;
    
    import java.io.File;
    
    /**
     * The Curl class provides a simple interface for creating HTTP requests using various HTTP methods.
     * It includes static methods for each HTTP method that return a CurlRequest object.
     *
     * <p>Example usage:</p>
     * <pre>
     * CurlRequest request = Curl.get("http://example.com");
     * </pre>
     *
     * <p>Supported HTTP methods:</p>
     * <ul>
    Registered: Thu Sep 04 15:34:10 UTC 2025
    - Last Modified: Sat Jul 05 01:38:18 UTC 2025
    - 5.5K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/util/concurrent/AggregateFutureStateFallbackAtomicHelperTest.java

        checkHelperVersion(getClass().getClassLoader(), "SafeAtomicHelper");
        checkHelperVersion(NO_ATOMIC_FIELD_UPDATER, "SynchronizedAtomicHelper");
    
        // Then, run the actual tests under each alternative classloader:
    
        runTestMethod(NO_ATOMIC_FIELD_UPDATER);
        // TODO(lukes): assert that the logs are full of errors
      }
    
      /**
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 18:46:00 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  6. src/main/java/jcifs/SidResolver.java

        /**
         * This specialized method returns a Map of users and local groups for the
         * target server where keys are SIDs representing an account and each value
         * is an ArrayList of SIDs represents the local groups that the account is
         * a member of.
         *
         * This method is designed to assist with computing access control for a
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  7. android/guava-testlib/src/com/google/common/collect/testing/DerivedCollectionGenerators.java

          // Start with a suitably shaped collection of entries
          Collection<Entry<K, V>> originalEntries = mapGenerator.getSampleElements(elements.length);
    
          // Create a copy of that, with the desired value for each key
          Collection<Entry<K, V>> entries = new ArrayList<>(elements.length);
          int i = 0;
          for (Entry<K, V> entry : originalEntries) {
            entries.add(mapEntry(keysArray[i++], entry.getValue()));
          }
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Jan 30 16:59:10 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/reflect/TypeResolver.java

             * the JDK against TypeVariables returned by TypeResolver. To work with all JDK versions,
             * TypeResolver must return the appropriate TypeVariable implementation in each of the three
             * possible cases:
             *
             * 1. Under Android, the built-in TypeVariable implementation interoperates with ours.
             * Therefore, we can always create our own TypeVariable.
             *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Sep 03 14:03:14 UTC 2025
    - 24.2K bytes
    - Viewed (0)
  9. tensorflow/c/c_api_experimental.cc

      // (as in the case of ConstOp kernel creation on GPU, which involves copying a
      // CPU tensor to GPU).
      // Setting a larger thread pool does not help with the Swift caller, as we use
      // a different TFE context for each thread of execution (for running graph
      // functions, and their send/recvs corountines).
      config.set_inter_op_parallelism_threads(1);
    
      TF_Buffer* ret = TF_NewBuffer();
      TF_CHECK_OK(MessageToBuffer(config, ret));
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 03:53:25 UTC 2025
    - 29.5K bytes
    - Viewed (0)
  10. src/main/java/jcifs/internal/dtyp/ACE.java

     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
Back to top