Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 342 for memcpy (0.04 sec)

  1. okhttp/src/commonJvmAndroid/kotlin/okhttp3/CookieJar.kt

     * interfere with session-based authentication schemes that require cookies.
     *
     * As persistence, implementations of this interface must also provide storage of cookies. Simple
     * implementations may store cookies in memory; sophisticated ones may use the file system or
     * database to hold accepted cookies. The [cookie storage model][rfc_6265_53] specifies policies for
     * updating and expiring cookies.
     *
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 2.4K bytes
    - Viewed (0)
  2. guava/src/com/google/common/util/concurrent/UncaughtExceptionHandlers.java

                    String.format(Locale.ROOT, "Caught an exception in %s.  Shutting down.", t),
                    e);
          } catch (Throwable errorInLogging) { // sneaky checked exception
            // If logging fails, e.g. due to missing memory, at least try to log the
            // message and the cause for the failed logging.
            System.err.println(e.getMessage());
            System.err.println(errorInLogging.getMessage());
          } finally {
            runtime.exit(1);
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Feb 10 21:03:40 UTC 2025
    - 2.8K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/io/ByteArrayDataInput.java

    import com.google.errorprone.annotations.CanIgnoreReturnValue;
    import java.io.DataInput;
    import java.io.IOException;
    import org.jspecify.annotations.Nullable;
    
    /**
     * An extension of {@code DataInput} for reading from in-memory byte arrays; its methods offer
     * identical functionality but do not throw {@link IOException}.
     *
     * <p><b>Warning:</b> The caller is responsible for not attempting to read past the end of the
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Dec 27 20:25:25 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  4. compat/maven-builder-support/src/main/java/org/apache/maven/building/Source.java

     */
    package org.apache.maven.building;
    
    import java.io.IOException;
    import java.io.InputStream;
    
    /**
     * Provides access to the contents of a source independently of the backing store (e.g. file system, database, memory).
     *
     * @deprecated since 4.0.0, use {@link org.apache.maven.api.services} instead
     */
    @Deprecated(since = "4.0.0")
    public interface Source {
    
        /**
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Wed Jan 15 18:51:29 UTC 2025
    - 1.8K bytes
    - Viewed (0)
  5. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/TikaExtractor.java

         */
        public void setReplaceDuplication(final boolean replaceDuplication) {
            this.replaceDuplication = replaceDuplication;
        }
    
        /**
         * Sets the memory size.
         * @param memorySize The memory size.
         */
        public void setMemorySize(final int memorySize) {
            this.memorySize = memorySize;
        }
    
        /**
         * Sets the maximum size of an alpha-numeric term.
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Thu Aug 07 02:55:08 UTC 2025
    - 30.7K bytes
    - Viewed (0)
  6. compat/maven-builder-support/src/main/java/org/apache/maven/building/StringSource.java

         */
        public StringSource(CharSequence content, String location) {
            this.content = (content != null) ? content.toString() : "";
            this.location = (location != null) ? location : "(memory)";
            this.hashCode = this.content.hashCode();
        }
    
        @Override
        public InputStream getInputStream() throws IOException {
            return new ByteArrayInputStream(content.getBytes(StandardCharsets.UTF_8));
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Wed Jan 15 18:51:29 UTC 2025
    - 3K bytes
    - Viewed (0)
  7. doc/asm.html

    Each <code>DATA</code> directive initializes a section of the
    corresponding memory.
    The memory not explicitly initialized is zeroed.
    The general form of the <code>DATA</code> directive is
    
    <pre>
    DATA	symbol+offset(SB)/width, value
    </pre>
    
    <p>
    which initializes the symbol memory at the given offset and width with the given value.
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Nov 28 19:15:27 UTC 2023
    - 36.3K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/Comparators.java

       * {@snippet :
       * Stream.of("foo", "quux", "banana", "elephant")
       *     .collect(least(2, comparingInt(String::length)))
       * // returns {"foo", "quux"}
       * }
       *
       * <p>This {@code Collector} uses O(k) memory and takes expected time O(n) (worst-case O(n log
       * k)), as opposed to e.g. {@code Stream.sorted(comparator).limit(k)}, which currently takes O(n
       * log n) time and O(n) space.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb/SmbOperationException.java

            /** File system errors (not found, access denied, etc.) */
            FILE_SYSTEM,
            /** Protocol errors (invalid message, unsupported operation, etc.) */
            PROTOCOL,
            /** Resource errors (out of memory, disk space, etc.) */
            RESOURCE,
            /** Configuration errors */
            CONFIGURATION,
            /** Transient errors that may succeed on retry */
            TRANSIENT,
            /** Unknown or unclassified errors */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  10. SECURITY.md

    models or graphs is equivalent to running untrusted code.
    
    If you need to run untrusted models, execute them inside a
    [**sandbox**](https://developers.google.com/code-sandboxing). Memory corruptions
    in TensorFlow ops can be recognized as security issues only if they are
    reachable and exploitable through production-grade, benign models.
    
    ### Compilation
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
Back to top