- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for CPU (0.13 sec)
-
RELEASE.md
* `tf.raw_ops.Bucketize` op on CPU. * `tf.where` op for data types `tf.int32`/`tf.uint32`/`tf.int8`/`tf.uint8`/`tf.int64`. * `tf.random.normal` op for output data type `tf.float32` on CPU. * `tf.random.uniform` op for output data type `tf.float32` on CPU. * `tf.random.categorical` op for output data type `tf.int64` on CPU. * `tensorflow.experimental.tensorrt`:
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2) -
lib/fips140/v1.0.0.zip
gcmAesFinish(productTable *[256]byte, tagMask, T *[16]byte, pLen, dLen uint64) // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var supportsAESGCM = cpu.X86HasAES && cpu.X86HasPCLMULQDQ && cpu.X86HasSSE41 && cpu.X86HasSSSE3 || cpu.ARM64HasAES && cpu.ARM64HasPMULL func init() { if cpu.AMD64 { impl.Register("gcm", "AES-NI", &supportsAESGCM) } if cpu.ARM64 { impl.Register("gcm", "Armv8.0", &supportsAESGCM) } } // checkGenericIsExpect is called by the variable-time implementation to make // sure it...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
- Using NUMA nodes instead of sockets for CPU manager hints. ([#99276](https://github.com/kubernetes/kubernetes/pull/99276), [@iwankgb](https://github.com/iwankgb)) [SIG Node]
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
*/ String getCrawlerHotthreadTimeout(); /** * Get the value for the key 'crawler.hotthread.type'. <br> * The value is, e.g. cpu <br> * comment: Type of hot thread monitoring (e.g., cpu). * @return The value of found property. (NotNull: if not found, exception but basically no way) */ String getCrawlerHotthreadType(); /**
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 525.6K bytes - Viewed (2) -
docs/en/docs/release-notes.md
* This solves a vulnerability that could allow denial of service attacks by using many small multipart fields/files (parts), consuming high CPU and memory. * Only applications using forms (e.g. file uploads) could be affected. * For most cases, upgrading won't have any breaking changes. ## 0.91.0 ### Upgrades
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Fri Sep 05 12:48:45 UTC 2025 - 544.1K bytes - Viewed (0)