Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for again (0.61 sec)

  1. tensorflow/c/experimental/filesystem/plugins/gcs/expiring_lru_cache_test.cc

      EXPECT_TRUE(cache.Lookup("a", &value));
      EXPECT_EQ(value, 1);
    
      // Delete the entry.
      EXPECT_TRUE(cache.Delete("a"));
      EXPECT_FALSE(cache.Lookup("a", &value));
    
      // Try deleting the entry again.
      EXPECT_FALSE(cache.Delete("a"));
      EXPECT_FALSE(cache.Lookup("a", &value));
    }
    
    }  // namespace
    C++
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Thu Jul 09 19:31:22 GMT 2020
    - 7.1K bytes
    - Viewed (0)
  2. .github/workflows/sigbuild-docker-presubmit.yml

                - `gcr.io/tensorflow-sigs/build:${{ github.event.number }}-python3.9`
                
                Re-apply the `build and push to gcr.io for staging` label to rebuild and push again. This comment will only be posted once.
          -
            name: Print image digest
    Others
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Oct 23 18:43:43 GMT 2023
    - 4K bytes
    - Viewed (0)
  3. ci/official/utilities/setup_macos.sh

      shopt -s expand_aliases
    else
      echo '==TFCI==: Error: Cannot find path to grealpath or gstat'
      echo 'TF CI scripts require GNU core utilties to be installed. Please make'
      echo 'sure they are present on your system and try again.'
      exit 1
    fi
    
    # "TFCI_MACOS_BAZEL_TEST_DIR_PATH" specifies the directory that Bazel should use
    # when running tests. Each test will be executed in a separate subdirectory
    Shell Script
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Thu Feb 15 15:23:28 GMT 2024
    - 6.2K bytes
    - Viewed (0)
  4. SECURITY.md

        TensorFlow models, please demonstrate an exploit against one of Alphabet's
        models in <https://tfhub.dev/>
      - An explanation of who can exploit this vulnerability, and what they gain
        when doing so. Write an attack scenario that demonstrates how your issue
        violates the use cases and security assumptions defined in the threat model.
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top