- Sort Score
- Num 10 results
- Language All
Results 41 - 50 of 81 for atMost (0.04 seconds)
-
android/guava-tests/test/com/google/common/collect/Collections2Test.java
Collections2.orderedPermutations( newArrayList( 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)) .size()); // Almost force an overflow in the binomial coefficient calculation assertEquals( 1391975640 /*C(34,14)*/, Collections2.orderedPermutations(concat(nCopies(20, 1), nCopies(14, 2))).size());
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 20.1K bytes - Click Count (0) -
guava-tests/test/com/google/common/collect/Collections2Test.java
Collections2.orderedPermutations( newArrayList( 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)) .size()); // Almost force an overflow in the binomial coefficient calculation assertEquals( 1391975640 /*C(34,14)*/, Collections2.orderedPermutations(concat(nCopies(20, 1), nCopies(14, 2))).size());
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 20.1K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures, * however, {@code Object.hashCode} almost always falls short -- hence this library. * * @author Kevin Bourrillion * @since 11.0 */ @Immutable public interface HashFunction { /**
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures, * however, {@code Object.hashCode} almost always falls short -- hence this library. * * @author Kevin Bourrillion * @since 11.0 */ @Immutable public interface HashFunction { /**
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/collect/AbstractBiMap.java
return Maps.keyIterator(entrySet().iterator()); } } @LazyInit private transient @Nullable Set<V> valueSet; @Override public Set<V> values() { /* * We can almost reuse the inverse's keySet, except we have to fix the * iteration order so that it is consistent with the forward map. */ Set<V> result = valueSet;
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 22 15:50:50 GMT 2025 - 14.3K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt
// that happens, then we will have buffered bytes that are needed by the SSLSocket! // This check is imperfect: it doesn't tell us whether a handshake will succeed, just // that it will almost certainly fail because the proxy has sent unexpected data. if (!socket.source.buffer.exhausted() || !socket.sink.buffer.exhausted()) { throw IOException("TLS tunnel buffered too many bytes!") }Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Oct 08 03:50:05 GMT 2025 - 19.3K bytes - Click Count (2) -
docs/en/docs/tutorial/security/oauth2-jwt.md
## Recap { #recap } With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT. In almost any framework handling the security becomes a rather complex subject quite quickly.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 10.6K bytes - Click Count (0) -
docs/en/docs/advanced/settings.md
function ->> code: return stored result end ``` In the case of our dependency `get_settings()`, the function doesn't even take any arguments, so it always returns the same value. That way, it behaves almost as if it was just a global variable. But as it uses a dependency function, then we can override it easily for testing.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 20 15:55:38 GMT 2025 - 11.2K bytes - Click Count (0) -
src/cmd/asm/internal/arch/arm64.go
// IsARM64CMP reports whether the op (as defined by an arm64.A* constant) is // one of the comparison instructions that require special handling. func IsARM64CMP(op obj.As) bool { switch op { case arm64.ACMN, arm64.ACMP, arm64.ATST, arm64.ACMNW, arm64.ACMPW, arm64.ATSTW, arm64.AFCMPS, arm64.AFCMPD, arm64.AFCMPES, arm64.AFCMPED: return true } return false }
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Oct 16 00:35:29 GMT 2025 - 6.3K bytes - Click Count (0) -
guava/src/com/google/common/math/LongMath.java
} /* * Uses the binary GCD algorithm; see http://en.wikipedia.org/wiki/Binary_GCD_algorithm. This is * >60% faster than the Euclidean algorithm in benchmarks. */ int aTwos = Long.numberOfTrailingZeros(a); a >>= aTwos; // divide out all 2s int bTwos = Long.numberOfTrailingZeros(b); b >>= bTwos; // divide out all 2s while (a != b) { // both a, b are oddCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Nov 03 21:01:09 GMT 2025 - 46.8K bytes - Click Count (0)