- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for dsn_string (0.06 sec)
-
docs/bucket/notifications/README.md
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 84.2K bytes - Viewed (0) -
src/test/java/jcifs/smb1/smb1/NtlmChallengeTest.java
NtlmChallenge nc = new NtlmChallenge(challenge, dc); String result = nc.toString(); // The format is: NtlmChallenge[challenge=0x<hex>,dc=<dc_string>] assertTrue(result.startsWith("NtlmChallenge[challenge=0x")); assertTrue(result.endsWith(",dc=SERVER123]")); // Hexdump.toHexString with size = length * 2 produces 8 uppercase hex charsRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 6K bytes - Viewed (0) -
tensorflow/c/c_api_test.cc
absl::Status status; for (const std::vector<int64_t>& dims : std::vector<std::vector<int64_t>>{{n}, {1, n}, {n, 1}, {n / 2, 2}}) { // Create C++ Tensor Tensor src(tensorflow::DT_STRING, TensorShape(dims)); for (int64_t i = 0; i < src.NumElements(); ++i) { src.flat<tstring>()(i) = data[i]; } TF_Tensor* dst = TF_TensorFromTensor(src, &status);
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Fri Dec 27 12:18:10 UTC 2024 - 97K bytes - Viewed (0) -
RELEASE.md
* Fixes an integer truncation vulnerability in code using the work sharder API, ([CVE-2020-15202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15202)) * Fixes a format string vulnerability in `tf.strings.as_string`, ([CVE-2020-15203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15203)) * Fixes segfault raised by calling session-only ops in eager mode,Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2)