Search Options

Results per page
Sort
Preferred Languages
Advance

Results 891 - 900 of 1,253 for gach (0.2 sec)

  1. mockwebserver/src/main/kotlin/mockwebserver3/MockResponse.kt

        fun socketPolicy(socketPolicy: SocketPolicy) =
          apply {
            this.socketPolicy = socketPolicy
          }
    
        /**
         * Throttles the request reader and response writer to sleep for the given period after each
         * series of [bytesPerPeriod] bytes are transferred. Use this to simulate network behavior.
         */
        fun throttleBody(
          bytesPerPeriod: Long,
          period: Long,
          unit: TimeUnit,
        ) = apply {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Tue Jan 23 14:31:42 UTC 2024
    - 13.3K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/SortedLists.java

       * key, the choice of {@link KeyAbsentBehavior} decides which index is returned.
       *
       * <p>This method runs in log(n) time on random-access lists, which offer near-constant-time
       * access to each list element.
       *
       * @param list the list to be searched.
       * @param key the value to be searched for.
       * @param comparator the comparator by which the list is ordered.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 11K bytes
    - Viewed (0)
  3. cni/pkg/nodeagent/podcgroupns.go

    }
    
    func isNotNumber(r rune) bool {
    	return r < '0' || r > '9'
    }
    
    func (p *PodNetnsProcFinder) FindNetnsForPods(pods map[types.UID]*corev1.Pod) (PodToNetns, error) {
    	/*
    		for each process, find its netns inode,
    		if we already seen the inode, skip it
    		if we haven't seen the inode, check the process cgroup and see if we
    		can extract a pod uid from it.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Apr 12 21:47:31 UTC 2024
    - 11K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/hash/HashTestUtils.java

       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
       * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
       * bit(i). One pair must differ in output bit(j), and one pair must not. This proves that input
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  5. guava/src/com/google/common/reflect/TypeResolver.java

             * compare TypeVariables from the JDK against TypeVariables returned by TypeResolver. To
             * work with all JDK versions, TypeResolver must return the appropriate TypeVariable
             * implementation in each of the three possible cases:
             *
             * 1. Prior to JDK 7u51, the JDK TypeVariable implementation interoperates with ours.
             * Therefore, we can always create our own TypeVariable.
             *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 10 19:45:10 UTC 2022
    - 24.2K bytes
    - Viewed (0)
  6. cmd/bucket-replication-utils.go

    	d := replicateTargetDecision{
    		Replicate:   replicate,
    		Synchronous: sync,
    		Arn:         arn,
    	}
    	return d
    }
    
    // ReplicateDecision represents replication decision for each target
    type ReplicateDecision struct {
    	targetsMap map[string]replicateTargetDecision
    }
    
    // ReplicateAny returns true if at least one target qualifies for replication
    func (d ReplicateDecision) ReplicateAny() bool {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:31:51 UTC 2024
    - 26.3K bytes
    - Viewed (0)
  7. src/main/webapp/js/admin/popper.min.js.map

    4C,IAAAA,OAAQjG,IAAAA,UAChC+O,EAAgB3I,EAAUmB,KAAVnB,CAAgB,GAAhBA,EAAqB,CAArBA,WAGlBuG,EAAU,EAAVA,EACQ,CAAC,EAAD,CAAU,CAAV,EAEAqC,WAGU,MAAlBD,QACKvM,KAAOa,EAAQ,CAARA,IACPX,MAAQW,EAAQ,CAARA,GACY,OAAlB0L,QACFvM,KAAOa,EAAQ,CAARA,IACPX,MAAQW,EAAQ,CAARA,GACY,KAAlB0L,QACFrM,MAAQW,EAAQ,CAARA,IACRb,KAAOa,EAAQ,CAARA,GACa,QAAlB0L,SACFrM,MAAQW,EAAQ,CAARA,IACRb,KAAOa,EAAQ,CAARA,KAGX4C,iBChHgBhD,KAAKgM,ML1DDhM,KAAViM,QAAUjM,KAAjB8J,S5BlBD9J,KAAKkM,OkCHmB,WAAlB,QAAOrQ,OAAP,EAAqD,WAApB,QAAOS,SAAxC,EAAyF,WAArB,Q...
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 120.9K bytes
    - Viewed (0)
  8. src/main/webapp/css/admin/adminlte.min.css.map

    sBAAA,UAAA,mBAAA,sBAGF,KACE,kBAAA,mBAAA,UAAA,oBAtBJ,mBACE,GACE,kBAAA,mBAAA,sBAAA,UAAA,mBAAA,sBACA,2BAAA,QACA,QAAA,EAGF,IACE,kBAAA,mBAAA,uBAAA,UAAA,mBAAA,uBACA,2BAAA,QAGF,IACE,kBAAA,mBAAA,sBAAA,UAAA,mBAAA,sBACA,QAAA,EAGF,IACE,kBAAA,mBAAA,sBAAA,UAAA,mBAAA,sBAGF,KACE,kBAAA,mBAAA,UAAA,oBAKJ,0BACE,KACE,QAAA,EAGF,GACE,QAAA,GANJ,kBACE,KACE,QAAA,EAGF,GACE,QAAA,GAIJ,2BACE,KACE,QAAA,EAGF,GACE,QAAA,GANJ,mBACE,KACE,QAAA,EAGF,GACE,QAAA,GAIJ,yBACE,GACE,kBAAA,mBAAA,UAAA,UAAA,mBAAA,UAEF,IACE,kBAAA,qBAAA,cAAA,UA...
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 3.7M bytes
    - Viewed (1)
  9. okhttp/src/main/kotlin/okhttp3/internal/connection/RealConnectionPool.kt

       * Returns -1 if no further cleanups are required.
       */
      fun closeConnections(now: Long): Long {
        // Compute the concurrent call capacity for each address. We won't close a connection if doing
        // so would violate a policy, unless it's OLD.
        val addressStates = this.addressStates
        for (state in addressStates.values) {
          state.concurrentCallCapacity = 0
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Apr 20 17:03:43 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/ObjectCountHashMap.java

       * index.
       *
       * <p>Its size must be a power of two.
       */
      private transient int[] table;
    
      /**
       * Contains the logical entries, in the range of [0, size()). The high 32 bits of each long is the
       * smeared hash of the element, whereas the low 32 bits is the "next" pointer (pointing to the
       * next entry in the bucket chain). The pointers in [size(), entries.length) are all "null"
       * (UNSET).
       */
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jun 01 22:07:10 UTC 2021
    - 15K bytes
    - Viewed (0)
Back to top