- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 168 for revised (0.05 sec)
-
CONTRIBUTING.md
### Create a Pull Request Pull requests can be created via GitHub. Refer to [this document](https://help.github.com/articles/creating-a-pull-request/) for detailed steps on how to create a pull request. After a Pull Request gets peer reviewed and approved, it will be merged. ## FAQs ### How does ``MinIO`` manage dependencies? ``MinIO`` uses `go mod` to manage its dependencies.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Aug 05 18:35:53 UTC 2024 - 2.9K bytes - Viewed (0) -
README.md
SequencedCollection<String> sequenced = CollectionsUtil.newLinkedHashSet(); String first = CollectionsUtil.getFirst(sequenced); String last = CollectionsUtil.getLast(sequenced); SequencedCollection<String> reversed = CollectionsUtil.reversed(sequenced); // Specialized collections LruHashMap<String, Object> lruCache = new LruHashMap<>(100); // LRU cache with max 100 entries CaseInsensitiveMap<String> configMap = new CaseInsensitiveMap<>(); ```
Registered: Fri Sep 05 20:58:11 UTC 2025 - Last Modified: Sun Aug 31 02:56:02 UTC 2025 - 12.7K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/Graphs.java
} // Graph mutation methods // Graph view methods /** * Returns a view of {@code graph} with the direction (if any) of every edge reversed. All other * properties remain intact, and further updates to {@code graph} will be reflected in the view. */ public static <N> Graph<N> transpose(Graph<N> graph) { if (!graph.isDirected()) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 01 00:26:14 UTC 2025 - 22.7K bytes - Viewed (0) -
guava/src/com/google/common/graph/Graphs.java
} // Graph mutation methods // Graph view methods /** * Returns a view of {@code graph} with the direction (if any) of every edge reversed. All other * properties remain intact, and further updates to {@code graph} will be reflected in the view. */ public static <N> Graph<N> transpose(Graph<N> graph) { if (!graph.isDirected()) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 01 00:26:14 UTC 2025 - 23.3K bytes - Viewed (0) -
guava/src/com/google/common/collect/BiMap.java
* that of its keys. This constraint enables bimaps to support an "inverse view", which is another * bimap containing the same entries as this bimap but with reversed keys and values. * * <h3>Implementations</h3> * * <ul> * <li>{@link ImmutableBiMap} * <li>{@link HashBiMap} * <li>{@link EnumBiMap} * <li>{@link EnumHashBiMap} * </ul> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 17:32:30 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/es/docs/how-to/separate-openapi-schemas.md
### Modelo para Salida en la Documentación También puedes revisar el modelo de salida en la documentación, **ambos** `name` y `description` están marcados como **requeridos** con un **asterisco rojo**: <div class="screenshot"> <img src="/img/tutorial/separate-openapi-schemas/image03.png"> </div> ### Modelo para Entrada y Salida en la Documentación
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 4.4K bytes - Viewed (0) -
docs/es/docs/tutorial/security/index.md
**FastAPI** proporciona varias herramientas para ayudarte a manejar la **Seguridad** de manera fácil, rápida y estándar, sin tener que estudiar y aprender todas las especificaciones de seguridad. Pero primero, vamos a revisar algunos pequeños conceptos. ## ¿Con prisa?
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 4.6K bytes - Viewed (0) -
docs/es/docs/benchmarks.md
Pero al revisar benchmarks y comparaciones, debes tener en cuenta lo siguiente. ## Benchmarks y velocidad Cuando ves los benchmarks, es común ver varias herramientas de diferentes tipos comparadas como equivalentes.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 17:46:44 UTC 2024 - 3.7K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
representative at an online or offline event. ## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at . All complaints will be reviewed and investigated promptly and fairly. All community leaders are obligated to respect the privacy and security of the reporter of any incident. ## Enforcement Guidelines
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Thu Oct 17 06:18:13 UTC 2024 - 5K bytes - Viewed (0) -
src/test/java/jcifs/netbios/NbtExceptionTest.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 5.9K bytes - Viewed (0)