- Sort Score
- Result 10 results
- Languages All
Results 281 - 290 of 591 for behaviors (0.08 sec)
-
android/guava/src/com/google/common/collect/MinMaxPriorityQueue.java
* concurrent modification, the iterator fails quickly and cleanly, rather than risking arbitrary, * non-deterministic behavior at an undetermined time in the future. * * <p>Note that the fail-fast behavior of an iterator cannot be guaranteed as it is, generally * speaking, impossible to make any hard guarantees in the presence of unsynchronized concurrent
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 34.1K bytes - Viewed (0) -
guava/src/com/google/common/io/Resources.java
*/ public static List<String> readLines(URL url, Charset charset) throws IOException { // don't use asCharSource(url, charset).readLines() because that returns // an immutable list, which would change the behavior of this method return readLines( url, charset, new LineProcessor<List<String>>() { final List<String> result = Lists.newArrayList(); @Override
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Aug 02 13:50:22 UTC 2024 - 7.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/ByteSourceTest.java
assertCorrectSlice(100, 5, 100, 95); assertCorrectSlice(100, 100, 0, 0); assertCorrectSlice(100, 100, 10, 0); assertCorrectSlice(100, 101, 10, 0); } /** * Tests that the default slice() behavior is correct when the source is sliced starting at an * offset that is greater than the current length of the source, a stream is then opened to that
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 15.4K bytes - Viewed (0) -
common-protos/k8s.io/api/certificates/v1/generated.proto
// 1. Trust distribution: how trust (CA bundles) are distributed. // 2. Permitted subjects: and behavior when a disallowed subject is requested. // 3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested. // 4. Required, permitted, or forbidden key usages / extended key usages.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 11.6K bytes - Viewed (0) -
src/main/java/jcifs/SidResolver.java
* The context to use * @param authorityServerName * The server from which the local groups will be queried. * @param flags * Flags that control the behavior of the operation. When all * name associated with SIDs will be required, the SID_FLAG_RESOLVE_SIDS * flag should be used which causes all group member SIDs to be resolved
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 4.6K bytes - Viewed (0) -
guava/src/com/google/common/io/LittleEndianDataOutputStream.java
} @Override public void writeUTF(String str) throws IOException { ((DataOutputStream) out).writeUTF(str); } // Overriding close() because FilterOutputStream's close() method pre-JDK8 has bad behavior: // it silently ignores any exception thrown by flush(). Instead, just close the delegate stream. // It should flush itself if necessary. @Override public void close() throws IOException { out.close();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 26 12:34:49 UTC 2024 - 5.2K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/SuccessorsFunction.java
* * <p>Some algorithms that operate on a {@code SuccessorsFunction} may produce undesired results * if the returned {@link Iterable} contains duplicate elements. Implementations of such * algorithms should document their behavior in the presence of duplicates. * * <p>The elements of the returned {@code Iterable} must each be: * * <ul> * <li>Non-null * <li>Usable as {@code Map} keys (see the Guava User Guide's section on <a
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Apr 26 17:43:39 UTC 2021 - 4.3K bytes - Viewed (0) -
guava/src/com/google/common/math/DoubleUtils.java
bits += signifRounded; /* * If signifRounded == 2^53, we'd need to set all of the significand bits to zero and add 1 to * the exponent. This is exactly the behavior we get from just adding signifRounded to bits * directly. If the exponent is MAX_DOUBLE_EXPONENT, we round up (correctly) to * Double.POSITIVE_INFINITY. */ bits |= x.signum() & SIGN_MASK;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 5.1K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/internal/idn/IdnaMappingTableTest.kt
} @Test fun binarySearchEmptyRange() { assertEquals(-1, binarySearch(0, 0) { error("unexpected call") }) } /** Confirm the compact table has the exact same behavior as the plain table. */ @Test fun comparePlainAndCompactTables() { val buffer = Buffer() for (codePoint in 0..0x10ffff) { val allowedByTable = table.map(codePoint, buffer)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.9K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// Must be UDP, TCP, or SCTP. // Default is TCP. // +optional optional string protocol = 3; // The application protocol for this port. // This is used as a hint for implementations to offer richer behavior for protocols that they understand. // This field follows standard Kubernetes label syntax. // Valid values are either: // // * Un-prefixed protocol names - reserved for IANA standard service names (as per
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0)