Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 178 for algorism (0.04 sec)

  1. guava/src/com/google/common/hash/AbstractStreamingHasher.java

     */
    // TODO(kevinb): this class still needs some design-and-document-for-inheritance love
    abstract class AbstractStreamingHasher extends AbstractHasher {
      /** Buffer via which we pass data to the hash algorithm (the implementor) */
      private final ByteBuffer buffer;
    
      /** Number of bytes to be filled before process() invocation(s). */
      private final int bufferSize;
    
      /** Number of bytes processed per process() invocation. */
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  2. guava/src/com/google/common/hash/Fingerprint2011.java

    import com.google.common.annotations.VisibleForTesting;
    
    /**
     * Implementation of Geoff Pike's fingerprint2011 hash function. See {@link Hashing#fingerprint2011}
     * for information on the behaviour of the algorithm.
     *
     * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to
     * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/graph/PredecessorsFunction.java

     * topological sort) that only need a way of accessing the predecessors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * {@snippet :
     * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction);
     * }
     *
     * you will invoke it depending on the graph representation you're using.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 4K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/graph/SuccessorsFunction.java

     * breadth first traversal) that only need a way of accessing the successors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * {@snippet :
     * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction);
     * }
     *
     * you will invoke it depending on the graph representation you're using.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  5. docs/compression/README.md

    MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2)
    streaming compression due to its stability and performance.
    
    This algorithm is specifically optimized for machine generated content.
    Write throughput is typically at least 500MB/s per CPU core,
    and scales with the number of available CPU cores.
    Decompression speed is typically at least 1GB/s.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  6. android/guava-tests/benchmark/com/google/common/collect/BinaryTreeTraverserBenchmark.java

            for (int i = 0; i < size; i++) {
              keys[i] = rng.nextInt();
            }
            return createTreap(Ints.asList(keys));
          }
    
          // See http://en.wikipedia.org/wiki/Treap for details on the algorithm.
          private Optional<BinaryNode> createTreap(List<Integer> keys) {
            if (keys.isEmpty()) {
              return Optional.absent();
            }
            int minIndex = 0;
            for (int i = 1; i < keys.size(); i++) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 4.9K bytes
    - Viewed (0)
  7. guava/src/com/google/common/escape/CharEscaper.java

       * from the resulting text.
       *
       * <p>If the character does not need to be escaped, this method should return {@code null}, rather
       * than a one-character array containing the character itself. This enables the escaping algorithm
       * to perform more efficiently.
       *
       * <p>An escaper is expected to be able to deal with any {@code char} value, so this method should
       * not throw any exceptions.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Feb 13 15:45:16 UTC 2025
    - 6.7K bytes
    - Viewed (0)
  8. maven-tests/mvnw.cmd

      }
      Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash
      if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) {
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Jul 12 12:05:57 UTC 2025
    - 6.8K bytes
    - Viewed (0)
  9. docs/erasure/README.md

    ## What is Erasure Code?
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  10. cmd/sts-handlers_test.go

            "claims": {
                "accessKey": "u4ccRswj62HV3Ifwima7",
                "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "ldapUsername": "svc.algorithm",
                "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "sa-policy": "inherited-policy"
            },
            "sessionPolicy": null,
            "status": "on",
            "name": "",
            "description": ""
        }
    }
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 100.2K bytes
    - Viewed (1)
Back to top