Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 41 - 50 of 81 for atMost (0.04 seconds)

  1. android/guava-tests/test/com/google/common/collect/Collections2Test.java

            Collections2.orderedPermutations(
                    newArrayList(
                        1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21))
                .size());
    
        // Almost force an overflow in the binomial coefficient calculation
        assertEquals(
            1391975640 /*C(34,14)*/,
            Collections2.orderedPermutations(concat(nCopies(20, 1), nCopies(14, 2))).size());
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 20.1K bytes
    - Click Count (0)
  2. guava-tests/test/com/google/common/collect/Collections2Test.java

            Collections2.orderedPermutations(
                    newArrayList(
                        1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21))
                .size());
    
        // Almost force an overflow in the binomial coefficient calculation
        assertEquals(
            1391975640 /*C(34,14)*/,
            Collections2.orderedPermutations(concat(nCopies(20, 1), nCopies(14, 2))).size());
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 20.1K bytes
    - Click Count (0)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
     * implementations in Java use). For the many uses of hash functions beyond data structures,
     * however, {@code Object.hashCode} almost always falls short -- hence this library.
     *
     * @author Kevin Bourrillion
     * @since 11.0
     */
    @Immutable
    public interface HashFunction {
      /**
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     * dispersion is easily corrected using a secondary hash function (which all reasonable hash table
     * implementations in Java use). For the many uses of hash functions beyond data structures,
     * however, {@code Object.hashCode} almost always falls short -- hence this library.
     *
     * @author Kevin Bourrillion
     * @since 11.0
     */
    @Immutable
    public interface HashFunction {
      /**
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  5. guava/src/com/google/common/collect/AbstractBiMap.java

          return Maps.keyIterator(entrySet().iterator());
        }
      }
    
      @LazyInit private transient @Nullable Set<V> valueSet;
    
      @Override
      public Set<V> values() {
        /*
         * We can almost reuse the inverse's keySet, except we have to fix the
         * iteration order so that it is consistent with the forward map.
         */
        Set<V> result = valueSet;
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Sep 22 15:50:50 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  6. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt

            // that happens, then we will have buffered bytes that are needed by the SSLSocket!
            // This check is imperfect: it doesn't tell us whether a handshake will succeed, just
            // that it will almost certainly fail because the proxy has sent unexpected data.
            if (!socket.source.buffer.exhausted() || !socket.sink.buffer.exhausted()) {
              throw IOException("TLS tunnel buffered too many bytes!")
            }
    
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Oct 08 03:50:05 GMT 2025
    - 19.3K bytes
    - Click Count (2)
  7. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap { #recap }
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 10.6K bytes
    - Click Count (0)
  8. docs/en/docs/advanced/settings.md

            function ->> code: return stored result
        end
    ```
    
    In the case of our dependency `get_settings()`, the function doesn't even take any arguments, so it always returns the same value.
    
    That way, it behaves almost as if it was just a global variable. But as it uses a dependency function, then we can override it easily for testing.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Dec 20 15:55:38 GMT 2025
    - 11.2K bytes
    - Click Count (0)
  9. src/cmd/asm/internal/arch/arm64.go

    // IsARM64CMP reports whether the op (as defined by an arm64.A* constant) is
    // one of the comparison instructions that require special handling.
    func IsARM64CMP(op obj.As) bool {
    	switch op {
    	case arm64.ACMN, arm64.ACMP, arm64.ATST,
    		arm64.ACMNW, arm64.ACMPW, arm64.ATSTW,
    		arm64.AFCMPS, arm64.AFCMPD,
    		arm64.AFCMPES, arm64.AFCMPED:
    		return true
    	}
    	return false
    }
    
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Oct 16 00:35:29 GMT 2025
    - 6.3K bytes
    - Click Count (0)
  10. guava/src/com/google/common/math/LongMath.java

        }
        /*
         * Uses the binary GCD algorithm; see http://en.wikipedia.org/wiki/Binary_GCD_algorithm. This is
         * >60% faster than the Euclidean algorithm in benchmarks.
         */
        int aTwos = Long.numberOfTrailingZeros(a);
        a >>= aTwos; // divide out all 2s
        int bTwos = Long.numberOfTrailingZeros(b);
        b >>= bTwos; // divide out all 2s
        while (a != b) { // both a, b are odd
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Nov 03 21:01:09 GMT 2025
    - 46.8K bytes
    - Click Count (0)
Back to Top