Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for resources (0.18 sec)

  1. SECURITY.md

    implement, and therefore security issues deriving from their absence are not
    considered a vulnerability in TensorFlow.
    
    ### Resource allocation
    
    A denial of service caused by one model could bring down the entire server, but
    we don't consider this as a vulnerability, given that models can exhaust
    resources in many different ways and solutions exist to prevent this from
    happening (e.g., rate limits, ACLs, monitors to restart broken servers).
    
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
  2. tensorflow/c/eager/parallel_device/BUILD

        ],
        visibility = ["//tensorflow/python:__pkg__"],
    )
    
    filegroup(
        name = "sources",
        srcs = [
            ":device_sources",
            ":lib_sources",
        ],
        visibility = ["//tensorflow/python:__pkg__"],
    )
    
    cc_library(
        name = "parallel_device",
        srcs = [":device_sources"],
        hdrs = [":device_headers"],
        visibility = ["//visibility:private"],
        deps = [
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Apr 01 20:19:06 GMT 2024
    - 4.8K bytes
    - Viewed (0)
  3. ci/official/containers/linux_arm64/Dockerfile

    # Install devtoolset devel dependencies
    COPY setup.sources.sh /setup.sources.sh
    COPY setup.packages.sh /setup.packages.sh
    COPY devel.packages.txt /devel.packages.txt
    COPY cuda.packages.txt /cuda.packages.txt
    RUN /setup.sources.sh && /setup.packages.sh /devel.packages.txt
    
    # Install various tools.
    # - bats: bash unit testing framework
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Jan 08 09:32:19 GMT 2024
    - 4.1K bytes
    - Viewed (1)
Back to top