HomeSort by relevance Sort by last modified time
    Searched full:extracted (Results 176 - 200 of 1311) sorted by null

1 2 3 4 5 6 78 91011>>

  /frameworks/base/core/java/android/inputmethodservice/
ExtractEditText.java 27 * extracted text in a full-screen input method.
103 // Mode was started on Extracted, needs to be stopped here.
  /frameworks/base/core/java/android/view/inputmethod/
InputMethodSession.java 97 * Called by a text editor to report its new extracted text when its
103 * @param text The new extracted text.
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/menu/descriptors/
MenuDescriptors.java 135 * and the javadoc & attributes extracted from the style map if any.
152 * Updates an ElementDescriptor with the javadoc & attributes extracted from the style
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/refactoring/
ExtractStyleRefactoring.java 102 * <li>Integrate with themes somehow -- make an option to have the extracted style go into
117 /** Set a style reference on the extracted elements? */
119 /** Remove the attributes that were extracted? */
121 /** List of attributes chosen by the user to be extracted */
123 /** Remove all attributes that match the extracted attributes names, regardless of value */
306 * should present as a selectable attribute to be extracted.
353 // Remove extracted attributes?
  /external/chromium_org/content/public/android/java/src/org/chromium/content/browser/
ResourceExtractor.java 135 throw new IOException(file + " extracted with 0 length!");
179 // the resource paks were extracted from. Returns null if a timestamp was found
238 * Specifies the .pak files that should be extracted from the APK's asset resources directory
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CredentialHelper.java 339 Log.d(TAG, "extracted alias = " + alias + ", entry=" + entry.getClass());
356 Log.d(TAG, "# certs extracted = " + certs.length);
364 Log.d(TAG, "# ca certs extracted = " + mCaCerts.size());
  /cts/tools/tradefed-host/
README 42 downloaded and extracted the CTS zip, the script can be found at
  /dalvik/libdex/
DexOptData.cpp 96 * type/size header (which was extracted immediately above).
  /dalvik/tools/
deadcode.py 9 When found, the name of the section is extracted. The entire contents
  /development/tools/mkstubs/src/com/android/mkstubs/
AsmAnalyzer.java 35 * This is mostly a helper extracted for convenience. Callers will want to use
StubGenerator.java 39 * This is an helper extracted for convenience. Callers just need to use
  /external/aac/libPCMutils/include/
pcmutils_lib.h 213 /** Set the matrix mixdown information extracted from the PCE of an AAC bitstream.
216 * @param [in] Matrix mixdown index present flag extracted from PCE.
217 * @param [in] The 2 bit matrix mixdown index extracted from PCE.
218 * @param [in] The pseudo surround enable flag extracted from PCE.
  /external/antlr/antlr-3.4/runtime/C/doxygen/
changes31.dox 50 /// for creating a token stream, extracted from those examples:
  /external/bison/po/
Makevars 27 # package. (Note that the msgstr strings, extracted from the package's
  /external/bison/runtime-po/
Makevars 29 # package. (Note that the msgstr strings, extracted from the package's
  /external/chromium/chrome/browser/chromeos/
version_loader.h 52 // If |full_version| is true version string with extra info is extracted,
  /external/chromium_org/android_webview/browser/
aw_contents_io_thread_client.h 84 // relevant for DownloadListener is already extracted.
  /external/chromium_org/chrome/browser/bookmarks/
bookmark_html_writer.h 77 // All URLs that are extracted from bookmarks. Used to fetch favicons
  /external/chromium_org/chrome/browser/chromeos/profiles/
profile_helper.h 54 // could not be extracted from |profile|.
  /external/chromium_org/chrome/browser/resources/print_preview/data/
measurement_system.js 27 * @return {!Array.<string>} The extracted symbols in the order
  /external/chromium_org/chrome/browser/safe_browsing/
browser_features.h 5 // Client-side phishing features that are extracted by the browser, after
  /external/chromium_org/chrome/browser/ui/android/tab_model/
tab_model.h 65 // Returns search terms extracted from the current url if possible.
  /external/chromium_org/chrome/installer/util/
delete_after_reboot_helper.h 55 // On success, this vector contains all of the string pairs extracted from
  /external/chromium_org/chrome/renderer/net/
predictor_queue.h 55 // can later be a corresponding read() to extracted the text.
  /external/chromium_org/chrome/renderer/safe_browsing/
scorer.h 6 // for a set of previously extracted features. The phishing score corresponds

Completed in 1158 milliseconds

1 2 3 4 5 6 78 91011>>