Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 111 - 120 of 211 for algoritma (0.09 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. impl/maven-core/src/main/java/org/apache/maven/lifecycle/internal/builder/multithreaded/SmartProjectComparator.java

    /**
     * Smart project comparator that orders projects based on critical path analysis.
     * Projects with longer downstream dependency chains are prioritized to maximize
     * parallel execution efficiency.
     *
     * <p>The algorithm calculates a weight for each project as:
     * weight = 1 + max(downstream_project_weights)
     *
     * <p>Projects are then sorted by weight in descending order, ensuring that
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Aug 06 12:03:40 GMT 2025
    - 4.6K bytes
    - Click Count (0)
  2. android/guava/src/com/google/common/collect/Collections2.java

      }
    
      /**
       * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}.
       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Aug 09 01:14:59 GMT 2025
    - 22.6K bytes
    - Click Count (0)
  3. src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java

            assertEquals(des, provider.providePrimaryInvertibleCryptographer());
            assertEquals(oneWayCryptographer, provider.providePrimaryOneWayCryptographer());
        }
    
        // Test with different hash algorithms
        @Test
        public void test_withSha512Cryptographer() {
            // Test with SHA512
            OneWayCryptographer sha512 = OneWayCryptographer.createSha512Cryptographer();
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Mar 13 23:01:26 GMT 2026
    - 13.2K bytes
    - Click Count (0)
  4. internal/hash/checksum_test.go

    				chksm.Type |= ChecksumFullObject
    			}
    
    			// Prepare the checksum map with appropriate headers
    			m := chksm.AsMap()
    			m[xhttp.AmzChecksumAlgo] = chksm.Type.String() // Set the algorithm explicitly
    			if chksm.Type.FullObjectRequested() {
    				m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeFullObject
    			} else {
    				m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeComposite
    			}
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 22 14:15:21 GMT 2025
    - 7.1K bytes
    - Click Count (0)
  5. android/guava/src/com/google/common/primitives/Ints.java

       *     {@code toIndex > fromIndex}
       * @since 32.0.0
       */
      public static void rotate(int[] array, int distance, int fromIndex, int toIndex) {
        // There are several well-known algorithms for rotating part of an array (or, equivalently,
        // exchanging two blocks of memory). This classic text by Gries and Mills mentions several:
        // https://ecommons.cornell.edu/bitstream/handle/1813/6292/81-452.pdf.
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Mar 17 16:45:58 GMT 2026
    - 31.3K bytes
    - Click Count (0)
  6. android/guava/src/com/google/common/hash/Crc32cHashFunction.java

      }
    
      @Override
      public String toString() {
        return "Hashing.crc32c()";
      }
    
      static final class Crc32cHasher extends AbstractStreamingHasher {
    
        /*
         * The striding algorithm works roughly as follows: it is universally the case that
         * CRC(x ^ y) == CRC(x) ^ CRC(y).  The approach we take is to break the message as follows,
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Dec 28 01:26:26 GMT 2024
    - 21.2K bytes
    - Click Count (0)
  7. internal/lsync/lrwmutex.go

    const (
    	lockRetryInterval = 50 * time.Millisecond
    )
    
    // lockLoop will acquire either a read or a write lock
    //
    // The call will block until the lock is granted using a built-in
    // timing randomized back-off algorithm to try again until successful
    func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) {
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Jan 02 17:15:06 GMT 2022
    - 4.8K bytes
    - Click Count (0)
  8. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if object.IsDeleteMarker {
    				log.Println("SKIPPED: DELETE marker object:", objFullPath(object))
    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 6.3K bytes
    - Click Count (0)
  9. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

        }
    
        /**
         * Test decrypt with DES encryption.
         *
         * @throws GeneralSecurityException if a security error occurs
         * @throws NoSuchAlgorithmException if the algorithm is not available
         */
        @Test
        void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException {
            KeyGenerator keyGen = KeyGenerator.getInstance("DES");
            keyGen.init(56);
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 7.7K bytes
    - Click Count (0)
  10. docs/compression/README.md

    MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2)
    streaming compression due to its stability and performance.
    
    This algorithm is specifically optimized for machine generated content.
    Write throughput is typically at least 500MB/s per CPU core,
    and scales with the number of available CPU cores.
    Decompression speed is typically at least 1GB/s.
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 5.2K bytes
    - Click Count (0)
Back to Top