- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for doThing (0.18 sec)
-
tensorflow/api_template.__init__.py
_tf2.enable() # API IMPORTS PLACEHOLDER # WRAPPER_PLACEHOLDER # Make sure directory containing top level submodules is in # the __path__ so that "from tensorflow.foo import bar" works. # We're using bitwise, but there's nothing special about that. _API_MODULE = _sys.modules[__name__].bitwise _tf_api_dir = _os.path.dirname(_os.path.dirname(_API_MODULE.__file__)) _current_module = _sys.modules[__name__] if not hasattr(_current_module, "__path__"):
Python - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Tue Mar 05 06:27:59 GMT 2024 - 6.7K bytes - Viewed (3) -
tensorflow/api_template_v1.__init__.py
Otherwise your code may be broken by the change. """) # Make sure directory containing top level submodules is in # the __path__ so that "from tensorflow.foo import bar" works. # We're using bitwise, but there's nothing special about that. _API_MODULE = _sys.modules[__name__].bitwise # pylint: disable=undefined-variable _current_module = _sys.modules[__name__] _tf_api_dir = _os.path.dirname(_os.path.dirname(_API_MODULE.__file__))
Python - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Tue Jan 23 02:14:00 GMT 2024 - 7.4K bytes - Viewed (0) -
ci/official/utilities/setup_docker.sh
if [[ "$TFCI_DOCKER_PULL_ENABLE" == 1 ]]; then # Simple retry logic for docker-pull errors. Sleeps for 15s if a pull fails. # Pulling an already-pulled container image will finish instantly, so # repeating the command costs nothing. docker pull "$TFCI_DOCKER_IMAGE" || sleep 15 docker pull "$TFCI_DOCKER_IMAGE" || sleep 15 docker pull "$TFCI_DOCKER_IMAGE" fi if [[ "$TFCI_DOCKER_REBUILD_ENABLE" == 1 ]]; then
Shell Script - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Fri Jan 26 15:27:59 GMT 2024 - 1.8K bytes - Viewed (0) -
SECURITY.md
TensorFlow models, please demonstrate an exploit against one of Alphabet's models in <https://tfhub.dev/> - An explanation of who can exploit this vulnerability, and what they gain when doing so. Write an attack scenario that demonstrates how your issue violates the use cases and security assumptions defined in the threat model. This will help us evaluate your report quickly, especially if the issue is
Plain Text - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Sun Oct 01 06:06:35 GMT 2023 - 9.6K bytes - Viewed (0)