- Sort Score
- Result 10 results
- Languages All
Results 351 - 360 of 394 for Compare (0.08 sec)
-
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/SitemapUrl.java
*/ private String changefreq; /** * The priority of this URL relative to other URLs on your site. Valid * values range from 0.0 to 1.0. This value does not affect how your pages * are compared to pages on other sites—it only lets the search engines know * which pages you deem most important for the crawlers. * * The default priority of a page is 0.5. *
Registered: Sun Nov 10 03:50:12 UTC 2024 - Last Modified: Thu Feb 22 01:36:27 UTC 2024 - 4.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactLinkedHashMap.java
* function doing a good job of distributing the elements to the buckets to a distribution not far * from uniform), and amortized since some operations can trigger a hash table resize. * * <p>As compared with {@link java.util.LinkedHashMap}, this structure places significantly reduced * load on the garbage collector by only using a constant number of internal objects. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Apr 01 16:15:01 UTC 2024 - 8.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
* Additional memory overhead per container ([#21737](https://github.com/docker/docker/issues/21737)) * Docker 1.10.3 contains [backports provided by RedHat](https://github.com/docker/docker/compare/v1.10.3...runcom:docker-1.10.3-stable) for known issues * Support for Docker version 1.9.x has been removed * rkt version 1.23.0+
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 5.4K bytes - Viewed (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
Então o código Python em sua aplicação seria equivalente a algo como: ```Python if "johndoe" == "stanleyjobson" and "love123" == "swordfish": ... ```
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 6.2K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AtomicDoubleArray.java
* java.util.concurrent.atomic} package specification for description of the properties of atomic * variables. * * <p><a id="bitEquals"></a>This class compares primitive {@code double} values in methods such as * {@link #compareAndSet} by comparing their bitwise representation using {@link * Double#doubleToRawLongBits}, which differs from both the primitive double {@code ==} operator and
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jun 14 17:55:55 UTC 2024 - 10.3K bytes - Viewed (0) -
common-protos/k8s.io/api/storage/v1alpha1/generated.proto
// // They are consumed by the kube-scheduler when a CSI driver opts into // capacity-aware scheduling with CSIDriverSpec.StorageCapacity. The scheduler // compares the MaximumVolumeSize against the requested size of pending volumes // to filter out unsuitable nodes. If MaximumVolumeSize is unset, it falls back // to a comparison against the less precise Capacity. If that is also unset,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 9.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 7.2K bytes - Viewed (0) -
cmd/xl-storage-meta-inline.go
in := x.afterVersion() sz, buf, _ := msgp.ReadMapHeaderBytes(in) newKeys := make([][]byte, 0, sz) newVals := make([][]byte, 0, sz) var removeKey func(s []byte) bool // Copy if big number of compares... if len(keys) > 5 && sz > 5 { mKeys := make(map[string]struct{}, len(keys)) for _, key := range keys { mKeys[key] = struct{}{} } removeKey = func(s []byte) bool { _, ok := mKeys[string(s)]
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Apr 04 12:04:40 UTC 2024 - 9.5K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0)