Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for Exported (0.06 sec)

  1. RELEASE.md

    *   Correctness fixes for fft_length parameter to `tf.spectral.rfft` &
        `tf.spectral.irfft`.
    *   Exported model signatures using the 'predict' method will no longer have
        their input and output keys silently ignored and rewritten to 'inputs' and
        'outputs'. If a model was exported with different names before 1.2, and is
        now served with tensorflow/serving, it will accept requests using 'inputs'
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (1)
  2. docs/en/docs/release-notes.md

    * New [WebSocketException (and docs)](https://fastapi.tiangolo.com/advanced/websockets/#using-depends-and-others), re-exported from Starlette.
    * Upgraded and relaxed dependencies for package extras `all` (including new Uvicorn version), when you install `"fastapi[all]"`.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Fri Sep 05 12:48:45 UTC 2025
    - 544.1K bytes
    - Viewed (0)
  3. lib/fips140/v1.0.0.zip

    then applying // decapsulation key dk to retrieve the same shared secret K. The PCT passes if // the two shared secret K values are equal. The PCT shall be performed either // when keys are generated/imported, prior to the first exportation, or prior to // the first operational use (if not exported before the first use)." func kemPCT1024(dk *DecapsulationKey1024) error { ek := dk.EncapsulationKey() K, c := ek.Encapsulate() K1, err := dk.Decapsulate(c) if err != nil { return err } if subtle.ConstantTimeCompare(K,...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.19.md

      - kubelet v1.20.0 - v1.20.10
      - kubelet <= v1.19.14
    
    **Fixed Versions**:
      - kubelet v1.22.2
      - kubelet v1.21.5
      - kubelet v1.20.11
      - kubelet v1.19.15
    
    This vulnerability was reported by Fabricio Voznika and Mark Wolters of Google.
    
    **CVSS Rating:** High (8.8) [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jan 05 05:42:32 UTC 2022
    - 489.7K bytes
    - Viewed (0)
Back to top