- Sort Score
- Result 10 results
- Languages All
Results 1361 - 1370 of 7,709 for Is (0.02 sec)
-
android/guava/src/com/google/common/hash/PrimitiveSink.java
* * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 3.9K bytes - Viewed (0) -
android/guava/src/com/google/common/net/UrlEscapers.java
* <li>The space character " " is converted into a plus sign "+". * <li>All other characters are converted into one or more bytes using UTF-8 encoding and each * byte is then represented by the 3-character string "%XY", where "XY" is the two-digit, * uppercase, hexadecimal representation of the byte value. * </ul> * * <p>This escaper is suitable for escaping parameter names and values even when <a
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 7.1K bytes - Viewed (0) -
CHANGELOG.md
* Breaking: `RecordedRequest.body` is now nullable. Null is used when the request does not have a body. * Breaking: `RecordedRequest.chunkSizes` is now nullable. Null is used when the request does not use chunked encoding. This is different from an empty list - that indicates the request is chunked but has no data.Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 07 19:32:33 UTC 2025 - 31.6K bytes - Viewed (2) -
tensorflow/c/c_api.h
// If this function succeeds: // * *status is set to an OK value, // * a TF_Operation is added to the graph, // * a non-null value pointing to the added operation is returned -- // this value is valid until the underlying graph is deleted. // Otherwise: // * *status is set to a non-OK value, // * the graph is not modified, // * a null value is returned. // In either case, it deletes `desc`.
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Oct 26 21:08:15 UTC 2023 - 82.3K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Iterables.java
* Returns the first element in {@code iterable} or {@code defaultValue} if the iterable is empty. * The {@link Iterators} analog to this method is {@link Iterators#getNext}. * * <p>If no default value is desired (and the caller instead wants a {@link * NoSuchElementException} to be thrown), it is recommended that {@code * iterable.iterator().next()} is used instead. *Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 43.6K bytes - Viewed (0) -
cmd/erasure-object.go
} ctx = lkctx.Context() // Release lock when the metadata is verified, and reader // is ready to be read. // // This is possible to be lock free because // - xl.meta for inlined objects has already read the data // into memory, any mutation on xl.meta subsequently is // inconsequential to the overall read operation. // - xl.meta metadata is still verified for quorum under lock()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 80.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/mail/CrawlerPostcard.java
* You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, * either express or implied. See the License for the specific language * governing permissions and limitations under the License. */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Mar 15 06:53:53 UTC 2025 - 10K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* mask of the ACE, the whole access check fails. If the ACE is an "allow" * ACE and <i>all</i> of the bits in the desired access bits match bits in * the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p>
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/netbios/NbtAddress.java
* * The degree of state that an NbtAddress has is dependant on how it was * created and what is required of it. The second degree of state is the * most common. This is the state information that would be retrieved from * WINS for example. Natrually it is not practical for every NbtAddress * to be populated will all state requiring a Node Status on every hostRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 15.1K bytes - Viewed (0) -
guava/src/com/google/common/math/PairedStats.java
* following constraints. This is the callers responsibility and is not enforced here. * * <ul> * <li>Both {@code xStats} and {@code yStats} must have the same {@code count}. * <li>If that {@code count} is 1, {@code sumOfProductsOfDeltas} must be exactly 0.0. * <li>If that {@code count} is more than 1, {@code sumOfProductsOfDeltas} must be finite. * </ul> */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 12.6K bytes - Viewed (0)