Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1071 - 1080 of 1,418 for were (0.05 sec)

  1. okhttp/src/main/kotlin/okhttp3/internal/cache/CacheStrategy.kt

              }
            }
          }
        }
    
        /** Returns a strategy to satisfy [request] using [cacheResponse]. */
        fun compute(): CacheStrategy {
          val candidate = computeCandidate()
    
          // We're forbidden from using the network and the cache is insufficient.
          if (candidate.networkRequest != null && request.cacheControl.onlyIfCached) {
            return CacheStrategy(null, null)
          }
    
          return candidate
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Apr 15 13:24:48 UTC 2024
    - 12K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/util/concurrent/SequentialExecutor.java

      /** see {@link WorkerRunningState} */
      @LazyInit
      @GuardedBy("queue")
      private WorkerRunningState workerRunningState = IDLE;
    
      /**
       * This counter prevents an ABA issue where a thread may successfully schedule the worker, the
       * worker runs and exhausts the queue, another thread enqueues a task and fails to schedule the
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Feb 01 21:46:34 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  3. guava-tests/test/com/google/common/hash/HashCodeTest.java

              new ExpectedHashCode(
                  new byte[] {
                    (byte) 0xef, (byte) 0xcd, (byte) 0xab, (byte) 0x89,
                    (byte) 0x67, (byte) 0x45, (byte) 0x23,
                        (byte) 0x01, // up to here, same bytes as above
                    (byte) 0x01, (byte) 0x02, (byte) 0x03, (byte) 0x04,
                    (byte) 0x05, (byte) 0x06, (byte) 0x07, (byte) 0x08
                  },
                  0x89abcdef,
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 21 14:28:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/graph/AbstractStandardUndirectedGraphTest.java

      }
    
      /**
       * Tests that the method {@code putEdge} will silently add the missing nodes to the graph, then
       * add the edge connecting them. We are not using the proxy methods here as we want to test {@code
       * putEdge} when the end-points are not elements of the graph.
       */
      @Test
      public void putEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 02 18:21:29 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  5. guava/src/com/google/common/util/concurrent/SequentialExecutor.java

      /** see {@link WorkerRunningState} */
      @LazyInit
      @GuardedBy("queue")
      private WorkerRunningState workerRunningState = IDLE;
    
      /**
       * This counter prevents an ABA issue where a thread may successfully schedule the worker, the
       * worker runs and exhausts the queue, another thread enqueues a task and fails to schedule the
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Feb 01 21:46:34 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  6. guava/src/com/google/common/hash/LittleEndianByteArray.java

            return Long.reverseBytes(bigEndian);
          }
    
          @Override
          public void putLongLittleEndian(byte[] array, int offset, long value) {
            // Reverse the order of the bytes before storing, since we're on big-endian hardware.
            long littleEndianValue = Long.reverseBytes(value);
            theUnsafe.putLong(array, (long) offset + BYTE_ARRAY_BASE_OFFSET, littleEndianValue);
          }
        };
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  7. compat/maven-model-builder/src/main/java/org/apache/maven/model/inheritance/DefaultInheritanceAssembler.java

                 * base URL inheritance on the module directory names as this information is unavailable for POMs in the
                 * repository. In other words, modules where artifactId != moduleDirName will see different effective URLs
                 * depending on how the model was constructed (from filesystem or from repository).
                 */
                if (child.getProjectDirectory() != null) {
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  8. impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/PlexusContainerCapsuleFactory.java

            }
            return exportedPackages;
        }
    
        /**
         * Note: overriding this method should be avoided. Preferred way to replace Maven components is the "normal" way
         * where the components are on index (are annotated with JSR330 annotations and Sisu index is created) and, they
         * have priorities set.
         */
        protected Module getCustomModule(C context, CoreExports exports) {
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 13.6K bytes
    - Viewed (0)
  9. cmd/utils_test.go

    		path           string
    		bucket, object string
    	}{
    		// Test case 1 normal case.
    		{
    			path:   "/bucket/object",
    			bucket: "bucket",
    			object: "object",
    		},
    		// Test case 2 where url only has separator.
    		{
    			path:   SlashSeparator,
    			bucket: "",
    			object: "",
    		},
    		// Test case 3 only bucket is present.
    		{
    			path:   "/bucket",
    			bucket: "bucket",
    			object: "",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Feb 23 21:28:14 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  10. docs/debugging/README.md

    mc: Encrypted file data successfully downloaded as inspect.ad2b43d8.enc
    mc: Decryption key: ad2b43d847fdb14e54c5836200177f7158b3f745433525f5d23c0e0208e50c9948540b54
    
    mc: The decryption key will ONLY be shown here. It cannot be recovered.
    mc: The encrypted file can safely be shared without the decryption key.
    mc: Even with the decryption key, data stored with encryption cannot be accessed.
    ```
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Feb 25 01:17:53 UTC 2022
    - 8.7K bytes
    - Viewed (0)
Back to top