- Sort Score
- Result 10 results
- Languages All
Results 711 - 720 of 794 for Weights (0.05 sec)
-
src/bufio/scan.go
// Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package bufio import ( "bytes" "errors" "io" "unicode/utf8" ) // Scanner provides a convenient interface for reading data such as // a file of newline-delimited lines of text. Successive calls to // the [Scanner.Scan] method will step through the 'tokens' of a file, skipping
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 23 09:06:30 UTC 2023 - 14.2K bytes - Viewed (0) -
src/builtin/builtin.go
// Copyright 2011 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. /* Package builtin provides documentation for Go's predeclared identifiers. The items documented here are not actually in package builtin but their descriptions here allow godoc to present documentation for the language's special identifiers. */ package builtin import "cmp"
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Thu Apr 11 20:22:45 UTC 2024 - 12.7K bytes - Viewed (0) -
misc/go_android_exec/main.go
// Copyright 2014 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // This wrapper uses syscall.Flock to prevent concurrent adb commands, // so for now it only builds on platforms that support that system call. // TODO(#33974): use a more portable library for file locking. //go:build darwin || dragonfly || freebsd || illumos || linux || netbsd || openbsd
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Aug 21 17:46:57 UTC 2023 - 15.3K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/riscv64.s
// Copyright 2019 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. #include "../../../../../runtime/textflag.h" TEXT asmtest(SB),DUPOK|NOSPLIT,$0 start: // // Unprivileged ISA // // 2.4: Integer Computational Instructions ADDI $2047, X5 // 9382f27f ADDI $-2048, X5 // 93820280 ADDI $2048, X5 // 9382024093820240
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0) -
src/main/resources/fess_config.properties
searchlog.agg.shard.size=-1 searchlog.request.headers= searchlog.process.batch_size=100 thumbnail.html.image.min.width=100 thumbnail.html.image.min.height=100 thumbnail.html.image.max.aspect.ratio=3.0 thumbnail.html.image.thumbnail.width=100 thumbnail.html.image.thumbnail.height=100 thumbnail.html.image.format=png thumbnail.html.image.xpath=//IMG thumbnail.html.image.exclude.extensions=svg,html,css,js thumbnail.generator.interval=0
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Tue Oct 01 14:13:38 UTC 2024 - 30.9K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashCode.java
* {@code int} value in little-endian order. * * @throws IllegalStateException if {@code bits() < 32} */ public abstract int asInt(); /** * Returns the first eight bytes of {@linkplain #asBytes() this hashcode's bytes}, converted to a * {@code long} value in little-endian order. * * @throws IllegalStateException if {@code bits() < 64} */ public abstract long asLong();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 19:54:59 UTC 2024 - 12.6K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
tensorflow/c/c_test_util.cc
/* Copyright 2017 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Oct 15 03:16:52 UTC 2021 - 17.8K bytes - Viewed (0) -
src/cmd/cgo/ast.go
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Parse input AST and prepare Prog structure. package main import ( "fmt" "go/ast" "go/format" "go/parser" "go/scanner" "go/token" "os" "strings" ) func parse(name string, src []byte, flags parser.Mode) *ast.File {
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 14 15:47:06 UTC 2024 - 14.3K bytes - Viewed (0)