- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for referrer (0.09 sec)
-
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
/** * Get the value for the key 'api.search.accept.referers'. <br> * The value is, e.g. <br> * comment: Accepted referers for API search. * @return The value of found property. (NotNull: if not found, exception but basically no way) */ String getApiSearchAcceptReferers(); /** * Get the value for the key 'api.search.accept.referers' as {@link Integer}. <br> * The value is, e.g. <br>Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 525.6K bytes - Viewed (2) -
src/main/webapp/css/admin/bootstrap.min.css.map
.col-xl-3, .col-xl-4, .col-xl-5, .col-xl-6, .col-xl-7, .col-xl-8, .col-xl-9, .col-xl-10, .col-xl-11, .col-xl-12, .col-xl,\n.col-xl-auto {\n position: relative;\n width: 100%;\n padding-right: 15px;\n padding-left: 15px;\n}\n\n.col {\n -ms-flex-preferred-size: 0;\n flex-basis: 0;\n -ms-flex-positive: 1;\n flex-grow: 1;\n max-width: 100%;\n}\n\n.row-cols-1 > * {\n -ms-flex: 0 0 100%;\n flex: 0 0 100%;\n max-width: 100%;\n}\n\n.row-cols-2 > * {\n -ms-flex: 0 0 50%;\n flex: 0 0 50%;\n max-width:...Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 639.3K bytes - Viewed (1) -
RELEASE.md
`tf.function` objects can now be called with arguments consistent with the original arguments or type specs passed to `get_concrete_function`. This calling convention is now the preferred way to use concrete functions with nested values and composite tensors. Please check the [guide](https://www.tensorflow.org/guide/concrete_function) for more details on `concrete_ function`.Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2) -
lib/fips140/v1.0.0.zip
// Implementation of the counterCrypt function in assembler. // Original loop is unrolled to allow for multiple encryption // streams to be done in parallel, which is achieved by interleaving // vcipher instructions from each stream. This is also referred to as // stitching, and provides significant performance improvements. // Some macros are defined which enable execution for big or little // endian as well as different ISA targets. //func (g *gcmAsm) counterCrypt(out, in []byte, counter *[gcmBlockSize]byte,...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0)