Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 233 for bit (0.03 sec)

  1. android/guava/src/com/google/common/math/DoubleUtils.java

        signifFloor &= SIGNIFICAND_MASK; // remove the implied bit
    
        /*
         * We round up if either the fractional part of signif is strictly greater than 0.5 (which is
         * true if the 0.5 bit is set and any lower bit is set), or if the fractional part of signif is
         * >= 0.5 and signifFloor is odd (which is true if both the 0.5 bit and the 1 bit are set).
         */
        boolean increment =
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  2. src/builtin/builtin.go

    )
    
    // uint8 is the set of all unsigned 8-bit integers.
    // Range: 0 through 255.
    type uint8 uint8
    
    // uint16 is the set of all unsigned 16-bit integers.
    // Range: 0 through 65535.
    type uint16 uint16
    
    // uint32 is the set of all unsigned 32-bit integers.
    // Range: 0 through 4294967295.
    type uint32 uint32
    
    // uint64 is the set of all unsigned 64-bit integers.
    // Range: 0 through 18446744073709551615.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Thu Apr 11 20:22:45 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  3. guava-tests/test/com/google/common/hash/Crc32cHashFunctionTest.java

        for (int b = 0; b < 4; ++b) {
          for (int bit = 128; bit != 0; bit >>= 1) {
            expected[b][bit] = next;
            next = advanceOneBit(next);
          }
        }
        for (int b = 0; b < 4; ++b) {
          expected[b][0] = 0;
          for (int bit = 2; bit < 256; bit <<= 1) {
            for (int i = bit + 1; i < (bit << 1); i++) {
              expected[b][i] = expected[b][bit] ^ expected[b][i ^ bit];
            }
          }
        }
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/hash/Hashing.java

       * SipHash-2-4 algorithm</a> using a seed value of {@code k = 00 01 02 ...}.
       *
       * @since 15.0
       */
      public static HashFunction sipHash24() {
        return SipHashFunction.SIP_HASH_24;
      }
    
      /**
       * Returns a hash function implementing the <a href="https://131002.net/siphash/">64-bit
       * SipHash-2-4 algorithm</a> using the given seed.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Jul 19 16:02:36 UTC 2024
    - 29.3K bytes
    - Viewed (0)
  5. okhttp/src/main/kotlin/okhttp3/internal/http2/Settings.kt

        val bit = 1 shl ENABLE_PUSH
        return if (bit and set != 0) values[ENABLE_PUSH] == 1 else defaultValue
      }
    
      fun getMaxConcurrentStreams(): Int {
        val bit = 1 shl MAX_CONCURRENT_STREAMS
        return if (bit and set != 0) values[MAX_CONCURRENT_STREAMS] else Int.MAX_VALUE
      }
    
      fun getMaxFrameSize(defaultValue: Int): Int {
        val bit = 1 shl MAX_FRAME_SIZE
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 3.8K bytes
    - Viewed (0)
  6. okhttp/src/main/kotlin/okhttp3/internal/idn/IdnaMappingTable.kt

     * bits.
     *
     * We split each code point into a 14-bit prefix and a 7-bit suffix. All code points with the same
     * prefix are called a 'section'. There are 128 code points per section.
     *
     * Ranges Data (32,612 bytes)
     * ==========================
     *
     * Each entry is 4 bytes, and represents a _range_ of code points that all share a common 14-bit
     * prefix. Entries are sorted by their complete code points.
     *
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Tue Apr 02 11:39:58 UTC 2024
    - 9K bytes
    - Viewed (0)
  7. internal/crypto/key.go

    	"github.com/minio/minio/internal/hash/sha256"
    	"github.com/minio/minio/internal/logger"
    	"github.com/minio/sio"
    )
    
    // ObjectKey is a 256 bit secret key used to encrypt the object.
    // It must never be stored in plaintext.
    type ObjectKey [32]byte
    
    // GenerateKey generates a unique ObjectKey from a 256 bit external key
    // and a source of randomness. If random is nil the default PRNG of the
    // system (crypto/rand) is used.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Mar 19 20:28:10 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  8. android/guava-tests/test/com/google/common/hash/Crc32cHashFunctionTest.java

        for (int b = 0; b < 4; ++b) {
          for (int bit = 128; bit != 0; bit >>= 1) {
            expected[b][bit] = next;
            next = advanceOneBit(next);
          }
        }
        for (int b = 0; b < 4; ++b) {
          expected[b][0] = 0;
          for (int bit = 2; bit < 256; bit <<= 1) {
            for (int i = bit + 1; i < (bit << 1); i++) {
              expected[b][i] = expected[b][bit] ^ expected[b][i ^ bit];
            }
          }
        }
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/hash/SipHashFunction.java

      // The number of compression rounds.
      private final int c;
      // The number of finalization rounds.
      private final int d;
      // Two 64-bit keys (represent a single 128-bit key).
      private final long k0;
      private final long k1;
    
      /**
       * @param c the number of compression rounds (must be positive)
       * @param d the number of finalization rounds (must be positive)
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Apr 20 18:43:59 UTC 2021
    - 5.3K bytes
    - Viewed (0)
  10. guava-tests/test/com/google/common/hash/HashTestUtils.java

       * most key spaces are ANYTHING BUT uniformly distributed. A bit(i) in the input is said to
       * 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output
       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 25.5K bytes
    - Viewed (0)
Back to top