OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:extracted
(Results
176 - 200
of
1311
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/frameworks/base/core/java/android/inputmethodservice/
ExtractEditText.java
27
*
extracted
text in a full-screen input method.
103
// Mode was started on
Extracted
, needs to be stopped here.
/frameworks/base/core/java/android/view/inputmethod/
InputMethodSession.java
97
* Called by a text editor to report its new
extracted
text when its
103
* @param text The new
extracted
text.
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/menu/descriptors/
MenuDescriptors.java
135
* and the javadoc & attributes
extracted
from the style map if any.
152
* Updates an ElementDescriptor with the javadoc & attributes
extracted
from the style
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/refactoring/
ExtractStyleRefactoring.java
102
* <li>Integrate with themes somehow -- make an option to have the
extracted
style go into
117
/** Set a style reference on the
extracted
elements? */
119
/** Remove the attributes that were
extracted
? */
121
/** List of attributes chosen by the user to be
extracted
*/
123
/** Remove all attributes that match the
extracted
attributes names, regardless of value */
306
* should present as a selectable attribute to be
extracted
.
353
// Remove
extracted
attributes?
/external/chromium_org/content/public/android/java/src/org/chromium/content/browser/
ResourceExtractor.java
135
throw new IOException(file + "
extracted
with 0 length!");
179
// the resource paks were
extracted
from. Returns null if a timestamp was found
238
* Specifies the .pak files that should be
extracted
from the APK's asset resources directory
/packages/apps/CertInstaller/src/com/android/certinstaller/
CredentialHelper.java
339
Log.d(TAG, "
extracted
alias = " + alias + ", entry=" + entry.getClass());
356
Log.d(TAG, "# certs
extracted
= " + certs.length);
364
Log.d(TAG, "# ca certs
extracted
= " + mCaCerts.size());
/cts/tools/tradefed-host/
README
42
downloaded and
extracted
the CTS zip, the script can be found at
/dalvik/libdex/
DexOptData.cpp
96
* type/size header (which was
extracted
immediately above).
/dalvik/tools/
deadcode.py
9
When found, the name of the section is
extracted
. The entire contents
/development/tools/mkstubs/src/com/android/mkstubs/
AsmAnalyzer.java
35
* This is mostly a helper
extracted
for convenience. Callers will want to use
StubGenerator.java
39
* This is an helper
extracted
for convenience. Callers just need to use
/external/aac/libPCMutils/include/
pcmutils_lib.h
213
/** Set the matrix mixdown information
extracted
from the PCE of an AAC bitstream.
216
* @param [in] Matrix mixdown index present flag
extracted
from PCE.
217
* @param [in] The 2 bit matrix mixdown index
extracted
from PCE.
218
* @param [in] The pseudo surround enable flag
extracted
from PCE.
/external/antlr/antlr-3.4/runtime/C/doxygen/
changes31.dox
50
/// for creating a token stream,
extracted
from those examples:
/external/bison/po/
Makevars
27
# package. (Note that the msgstr strings,
extracted
from the package's
/external/bison/runtime-po/
Makevars
29
# package. (Note that the msgstr strings,
extracted
from the package's
/external/chromium/chrome/browser/chromeos/
version_loader.h
52
// If |full_version| is true version string with extra info is
extracted
,
/external/chromium_org/android_webview/browser/
aw_contents_io_thread_client.h
84
// relevant for DownloadListener is already
extracted
.
/external/chromium_org/chrome/browser/bookmarks/
bookmark_html_writer.h
77
// All URLs that are
extracted
from bookmarks. Used to fetch favicons
/external/chromium_org/chrome/browser/chromeos/profiles/
profile_helper.h
54
// could not be
extracted
from |profile|.
/external/chromium_org/chrome/browser/resources/print_preview/data/
measurement_system.js
27
* @return {!Array.<string>} The
extracted
symbols in the order
/external/chromium_org/chrome/browser/safe_browsing/
browser_features.h
5
// Client-side phishing features that are
extracted
by the browser, after
/external/chromium_org/chrome/browser/ui/android/tab_model/
tab_model.h
65
// Returns search terms
extracted
from the current url if possible.
/external/chromium_org/chrome/installer/util/
delete_after_reboot_helper.h
55
// On success, this vector contains all of the string pairs
extracted
from
/external/chromium_org/chrome/renderer/net/
predictor_queue.h
55
// can later be a corresponding read() to
extracted
the text.
/external/chromium_org/chrome/renderer/safe_browsing/
scorer.h
6
// for a set of previously
extracted
features. The phishing score corresponds
Completed in 1158 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>