- Sort Score
- Result 10 results
- Languages All
Results 81 - 90 of 479 for considered (0.12 sec)
-
android/guava/src/com/google/common/xml/XmlEscapers.java
private static final char MIN_ASCII_CONTROL_CHAR = 0x00; private static final char MAX_ASCII_CONTROL_CHAR = 0x1F; // For each xxxEscaper() method, please add links to external reference pages // that are considered authoritative for the behavior of that escaper. /** * Returns an {@link Escaper} instance that escapes special characters in a string so it can * safely be included in an XML document as element content. See section <a
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jan 18 20:55:09 UTC 2022 - 6.5K bytes - Viewed (0) -
apache-maven/src/assembly/maven/bin/mvn
exit 1 fi fi # traverses directory structure from process work directory to filesystem root # first directory with .mvn subdirectory is considered project base directory find_maven_basedir() { ( basedir=`find_file_argument_basedir "$@"` wdir="$basedir" while : do if [ -d "$wdir"/.mvn ] ; then basedir=$wdir break
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Thu Oct 24 12:01:35 UTC 2024 - 6.5K bytes - Viewed (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/inheritance/DefaultInheritanceAssembler.java
* In detail, the algo relies on the following assumptions: <ul> * <li>The parent uses aggregation and refers to the child via the modules section</li> * <li>The module path to the child is considered to * point at the POM rather than its base directory if the path ends with ".xml" (ignoring case)</li> * <li>The name of the child's base directory matches the artifact id of the child.</li> * </ul>
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 13.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
* Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the * first permutation will be in ascending order, and the last will be in descending order. * * <p>Duplicate elements are considered equal. For example, the list [1, 1] will have only one * permutation, instead of two. This is why the elements have to implement {@link Comparable}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 20:24:49 UTC 2024 - 22.8K bytes - Viewed (0) -
guava/src/com/google/common/graph/Network.java
*/ EndpointPair<N> incidentNodes(E edge); /** * Returns a live view of the edges which have an {@link #incidentNodes(Object) incident node} in * common with {@code edge}. An edge is not considered adjacent to itself. * * <p>If {@code edge} is removed from the network after this method is called, the {@code Set} * {@code view} returned by this method will be invalidated, and will throw {@code
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 10 15:41:27 UTC 2024 - 22.4K bytes - Viewed (0) -
okhttp-logging-interceptor/src/main/kotlin/okhttp3/logging/HttpLoggingInterceptor.kt
* [application interceptor][OkHttpClient.interceptors] or as a [OkHttpClient.networkInterceptors]. * * The format of the logs created by this class should not be considered stable and may * change slightly between releases. If you need a stable logging format, use your own interceptor. */ class HttpLoggingInterceptor @JvmOverloads constructor(
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Apr 06 09:14:38 UTC 2024 - 11.2K bytes - Viewed (0) -
build-logic/binary-compatibility/src/test/groovy/gradlebuild/binarycompatibility/PublicAPIRulesTest.groovy
then: violation.severity == Severity.info violation.humanExplanation == 'New public API in 11.38 (@Incubating)' } def "constructors with @Inject annotation are not considered public API"() { given: def rule = withContext(ruleElem) def annotations = [] jApiConstructor.annotations >> annotations when: annotations.clear()
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Fri Dec 01 20:12:19 UTC 2023 - 16K bytes - Viewed (0) -
guava/src/com/google/common/base/Utf8.java
* decoded. For example, some versions of the JDK decoder will accept "non-shortest form" byte * sequences, but encoding never reproduces these. Such byte sequences are <i>not</i> considered * well-formed. * * <p>This method returns {@code true} if and only if {@code Arrays.equals(bytes, new * String(bytes, UTF_8).getBytes(UTF_8))} does, but is more efficient in both time and space. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access * mask of the ACE, the whole access check fails. If the ACE is an "allow"
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
/* * This still isn't quite right. If one npa object does not have external * hashes and the other does then they will not be considered equal even * though they may be. */ } return true; } return false; } /**
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Tue Jul 07 10:50:16 UTC 2020 - 8.5K bytes - Viewed (0)