- Sort Score
- Num 10 results
- Language All
Results 121 - 130 of 193 for Algorithms (0.07 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
internal/hash/checksum_test.go
chksm.Type |= ChecksumFullObject } // Prepare the checksum map with appropriate headers m := chksm.AsMap() m[xhttp.AmzChecksumAlgo] = chksm.Type.String() // Set the algorithm explicitly if chksm.Type.FullObjectRequested() { m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeFullObject } else { m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeComposite }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 22 14:15:21 GMT 2025 - 7.1K bytes - Click Count (0) -
docs/debugging/hash-set/main.go
"encoding/binary" "flag" "fmt" "hash/crc32" "log" "os" "strings" "github.com/dchest/siphash" "github.com/google/uuid" ) // hashes the key returning an integer based on the input algorithm. // This function currently supports // - SIPMOD func sipHashMod(key string, cardinality int, id [16]byte) int { if cardinality <= 0 { return -1 } // use the faster version as per siphash docs
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Sep 19 18:05:16 GMT 2022 - 3.7K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/Collections2.java
} /** * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}. * * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that theCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 22.6K bytes - Click Count (0) -
internal/lsync/lrwmutex.go
const ( lockRetryInterval = 50 * time.Millisecond ) // lockLoop will acquire either a read or a write lock // // The call will block until the lock is granted using a built-in // timing randomized back-off algorithm to try again until successful func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) { r := rand.New(rand.NewSource(time.Now().UnixNano()))
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Jan 02 17:15:06 GMT 2022 - 4.8K bytes - Click Count (0) -
docs/compression/README.md
MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2) streaming compression due to its stability and performance. This algorithm is specifically optimized for machine generated content. Write throughput is typically at least 500MB/s per CPU core, and scales with the number of available CPU cores. Decompression speed is typically at least 1GB/s.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 5.2K bytes - Click Count (0) -
docs/debugging/s3-check-md5/main.go
continue } if object.IsDeleteMarker { log.Println("SKIPPED: DELETE marker object:", objFullPath(object)) continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 6.3K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
} /** * Test decrypt with DES encryption. * * @throws GeneralSecurityException if a security error occurs * @throws NoSuchAlgorithmException if the algorithm is not available */ @Test void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException { KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56);Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 7.7K bytes - Click Count (0) -
src/test/java/jcifs/ACETest.java
verify(ace).getApplyToText(); } } @Nested @DisplayName("Windows Access Check Algorithm Tests") class WindowsAccessCheckTests { @Test @DisplayName("Should simulate access check algorithm from documentation") void shouldSimulateDocumentationExample() {
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 24.4K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/ImmutableList.java
: ImmutableList.<E>construct(elements.clone()); } /** * Returns an immutable list containing the given elements, sorted according to their natural * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the * order in which they appear in the input. * * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 23 17:50:58 GMT 2025 - 27.5K bytes - Click Count (0) -
compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java
Model child = getModel(baseName + "-child"); if (fromRepo) { // when model is read from repo, a stream is used, then pomFile == null // (has consequences in inheritance algorithm since getProjectDirectory() returns null) parent = parent.clone(); parent.setPomFile(null); child = child.clone(); child.setPomFile(null); }Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Wed Sep 17 10:01:14 GMT 2025 - 8.2K bytes - Click Count (0)