- Sort Score
- Num 10 results
- Language All
Results 1 - 6 of 6 for preferred (0.1 seconds)
-
RELEASE.md
`tf.function` objects can now be called with arguments consistent with the original arguments or type specs passed to `get_concrete_function`. This calling convention is now the preferred way to use concrete functions with nested values and composite tensors. Please check the [guide](https://www.tensorflow.org/guide/concrete_function) for more details on `concrete_ function`.Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Mon Mar 30 18:31:38 GMT 2026 - 746.5K bytes - Click Count (3) -
src/main/webapp/css/admin/bootstrap.min.css.map
.col-xl-3, .col-xl-4, .col-xl-5, .col-xl-6, .col-xl-7, .col-xl-8, .col-xl-9, .col-xl-10, .col-xl-11, .col-xl-12, .col-xl,\n.col-xl-auto {\n position: relative;\n width: 100%;\n padding-right: 15px;\n padding-left: 15px;\n}\n\n.col {\n -ms-flex-preferred-size: 0;\n flex-basis: 0;\n -ms-flex-positive: 1;\n flex-grow: 1;\n max-width: 100%;\n}\n\n.row-cols-1 > * {\n -ms-flex: 0 0 100%;\n flex: 0 0 100%;\n max-width: 100%;\n}\n\n.row-cols-2 > * {\n -ms-flex: 0 0 50%;\n flex: 0 0 50%;\n max-width:...Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Oct 26 01:49:09 GMT 2024 - 639.3K bytes - Click Count (1) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
/** The key of the configuration. e.g. Referrer-Policy:strict-origin-when-cross-origin */ String API_JSON_RESPONSE_HEADERS = "api.json.response.headers"; /** The key of the configuration. e.g. false */ String API_JSON_RESPONSE_EXCEPTION_INCLUDED = "api.json.response.exception.included"; /** The key of the configuration. e.g. Referrer-Policy:strict-origin-when-cross-origin */Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 576.9K bytes - Click Count (2) -
CHANGELOG/CHANGELOG-1.19.md
manually upgraded component configs to be supplied in a YAML file via the --config option during upgrade plan & apply. The old behavior of --config in which kubeadm configuration and component configs that overwrite everything cluster stored is preserved too. The behavior to use with --config is now determined based on whether kubeadm config API objects (API group "kubeadm.kubernetes.io") were supplied in the file or not. ([#91980](https://github.com/kubernetes/kubernetes/pull/91980), [@rosti](h...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jan 05 05:42:32 GMT 2022 - 489.7K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
// Implementation of the counterCrypt function in assembler. // Original loop is unrolled to allow for multiple encryption // streams to be done in parallel, which is achieved by interleaving // vcipher instructions from each stream. This is also referred to as // stitching, and provides significant performance improvements. // Some macros are defined which enable execution for big or little // endian as well as different ISA targets. //func (g *gcmAsm) counterCrypt(out, in []byte, counter *[gcmBlockSize]byte,...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
// Implementation of the counterCrypt function in assembler. // Original loop is unrolled to allow for multiple encryption // streams to be done in parallel, which is achieved by interleaving // vcipher instructions from each stream. This is also referred to as // stitching, and provides significant performance improvements. // Some macros are defined which enable execution for big or little // endian as well as different ISA targets. //func (g *gcmAsm) counterCrypt(out, in []byte, counter *[gcmBlockSize]byte,...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0)