- Sort Score
- Result 10 results
- Languages All
Results 621 - 630 of 806 for clauses (0.08 sec)
-
android/guava/src/com/google/common/util/concurrent/AggregateFuture.java
// Whenever both tests are cheap and functional, it's faster to use &, | instead of &&, || "ShortCircuitBoolean") abstract class AggregateFuture<InputT extends @Nullable Object, OutputT extends @Nullable Object> extends AggregateFutureState<OutputT> { private static final LazyLogger logger = new LazyLogger(AggregateFuture.class); /** * The input futures. After {@link #init}, this field is read only by {@link #afterDone()} (to
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 13:13:32 UTC 2024 - 16.2K bytes - Viewed (0) -
SECURITY.md
implement, and therefore security issues deriving from their absence are not considered a vulnerability in TensorFlow. ### Resource allocation A denial of service caused by one model could bring down the entire server, but we don't consider this as a vulnerability, given that models can exhaust resources in many different ways and solutions exist to prevent this from
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
cni/pkg/cmd/root.go
// the CNI binary installed. if err = installer.Run(ctx); err != nil { if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) { log.Infof("installer complete: %v", err) // Error was caused by interrupt/termination signal err = nil } else { log.Errorf("installer failed: %v", err) } } if cleanErr := installer.Cleanup(); cleanErr != nil { if err != nil {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Aug 16 15:33:47 UTC 2024 - 12.7K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableLongArray.java
* #toString} behavior you expect. * <li>Offers useful operations beyond just {@code get} and {@code length}, so you don't have to * hunt through classes like {@link Arrays} and {@link Longs} for them. * <li>Supports a copy-free {@link #subArray} view, so methods that accept this type don't need to * add overloads that accept start and end indexes.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 22.3K bytes - Viewed (0) -
guava/src/com/google/common/primitives/ImmutableIntArray.java
* #toString} behavior you expect. * <li>Offers useful operations beyond just {@code get} and {@code length}, so you don't have to * hunt through classes like {@link Arrays} and {@link Ints} for them. * <li>Supports a copy-free {@link #subArray} view, so methods that accept this type don't need to * add overloads that accept start and end indexes.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 21.4K bytes - Viewed (0) -
src/main/java/org/codelibs/core/beans/impl/BeanDescImpl.java
/** * {@link BeanDesc}の実装クラスです。 * * @author higa */ public class BeanDescImpl implements BeanDesc { /** 空のオブジェクト配列 */ protected static final Object[] EMPTY_ARGS = new Object[0]; /** 空のクラス配列 */ protected static final Class<?>[] EMPTY_PARAM_TYPES = new Class<?>[0]; /** Beanのクラス */ protected final Class<?> beanClass; /** 型引数と型変数のマップ */
Registered: Fri Nov 01 20:58:10 UTC 2024 - Last Modified: Thu Mar 07 01:59:08 UTC 2024 - 26.1K bytes - Viewed (0) -
android/pom.xml
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 14:51:04 UTC 2024 - 21K bytes - Viewed (0) -
pom.xml
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 14:51:04 UTC 2024 - 20.6K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* including those in many JDK classes. * * <p>{@code Object.hashCode} implementations tend to be very fast, but have weak collision * prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0)