Search Options

Results per page
Sort
Preferred Languages
Advance

Results 651 - 660 of 1,058 for order1 (0.03 sec)

  1. android/guava/src/com/google/common/util/concurrent/IgnoreJRERequirement.java

    import static java.lang.annotation.ElementType.METHOD;
    import static java.lang.annotation.ElementType.TYPE;
    
    import java.lang.annotation.Target;
    
    /**
     * Disables Animal Sniffer's checking of compatibility with older versions of Java/Android.
     *
     * <p>Each package's copy of this annotation needs to be listed in our {@code pom.xml}.
     */
    @Target({METHOD, CONSTRUCTOR, TYPE, FIELD})
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Jul 02 18:21:28 UTC 2025
    - 1.1K bytes
    - Viewed (1)
  2. android/guava/src/com/google/common/util/concurrent/ServiceManagerBridge.java

    import com.google.common.util.concurrent.Service.State;
    
    /**
     * Superinterface of {@link ServiceManager} to introduce a bridge method for {@code
     * servicesByState()}, to ensure binary compatibility with older Guava versions that specified
     * {@code servicesByState()} to return {@code ImmutableMultimap}.
     */
    @J2ktIncompatible
    @GwtIncompatible
    interface ServiceManagerBridge {
      ImmutableMultimap<State, Service> servicesByState();
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  3. guava/src/com/google/common/cache/IgnoreJRERequirement.java

    import static java.lang.annotation.ElementType.METHOD;
    import static java.lang.annotation.ElementType.TYPE;
    
    import java.lang.annotation.Target;
    
    /**
     * Disables Animal Sniffer's checking of compatibility with older versions of Java/Android.
     *
     * <p>Each package's copy of this annotation needs to be listed in our {@code pom.xml}.
     */
    @Target({METHOD, CONSTRUCTOR, TYPE, FIELD})
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Jul 02 18:21:28 UTC 2025
    - 1.1K bytes
    - Viewed (0)
  4. LICENSE

    reinstated, you do not qualify to receive new licenses for the same
    material under section 10.
    
      9. Acceptance Not Required for Having Copies.
    
      You are not required to accept this License in order to receive or
    run a copy of the Program.  Ancillary propagation of a covered work
    occurring solely as a consequence of using peer-to-peer transmission
    to receive a copy likewise does not require acceptance.  However,
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  5. src/main/java/org/codelibs/fess/app/service/UserInfoService.java

        /**
         * Default constructor for UserInfoService.
         */
        public UserInfoService() {
            // Default constructor
        }
    
        /**
         * Deletes user information records older than the specified number of days.
         * This method is used for data cleanup and maintenance operations.
         *
         * @param days the number of days to keep user information records
         */
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 1.7K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/io/CharSink.java

       */
      public abstract Writer openStream() throws IOException;
    
      /**
       * Opens a new buffered {@link Writer} for writing to this sink. The returned stream is not
       * required to be a {@link BufferedWriter} in order to allow implementations to simply delegate to
       * {@link #openStream()} when the stream returned by that method does not benefit from additional
       * buffering. This method returns a new, independent writer each time it is called.
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Apr 14 16:07:06 UTC 2025
    - 6.7K bytes
    - Viewed (0)
  7. api/maven-api-core/src/main/java/org/apache/maven/api/Lifecycle.java

     * code, running tests, packaging the project, and deploying it. Executing a phase
     * triggers all preceding phases, ensuring that each step of the build process is
     * completed in the correct order. The three main lifecycles in Maven are
     * {@link #DEFAULT default}, {@link #CLEAN clean}, and {@link #SITE site}, with the
     * {@code default} lifecycle being the most commonly used for project builds.
     *
     * @since 4.0.0
     */
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  8. internal/hash/crc.go

    var crc64Table = crc64.MakeTable(bits.Reverse64(crc64NVMEPolynomial))
    
    // Following is ported from C to Go in 2016 by Justin Ruggles, with minimal alteration.
    // Used uint for unsigned long. Used uint32 for input arguments in order to match
    // the Go hash/crc32 package. zlib CRC32 combine (https://github.com/madler/zlib)
    // Modified for hash/crc64 by Klaus Post, 2024.
    func gf2MatrixTimes(mat []uint64, vec uint64) uint64 {
    	var sum uint64
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Jan 20 14:49:07 UTC 2025
    - 5.8K bytes
    - Viewed (0)
  9. apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt

    in connection with its distribution of the Program in a commercial product
    offering. The obligations in this section do not apply to any claims or Losses
    relating to any actual or alleged intellectual property infringement. In order
    to qualify, an Indemnified Contributor must: a) promptly notify the Commercial
    Contributor in writing of such claim, and b) allow the Commercial Contributor
    to control, and cooperate with the Commercial Contributor in, the defense
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Mon Sep 17 05:50:12 UTC 2018
    - 11.1K bytes
    - Viewed (0)
  10. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
Back to top