- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 234 for paper (0.15 seconds)
-
src/main/webapp/WEB-INF/view/chat/chat.jsp
aria-label="<la:message key="labels.chat_input_placeholder" />"></textarea> <button type="button" id="sendBtn" class="btn btn-primary" aria-label="<la:message key="labels.chat_send" />"> <i class="fa fa-paper-plane" aria-hidden="true"></i> </button> </div> <div class="input-footer"> <span class="input-hint"><la:message key="labels.chat_input_hint" /></span>
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 19 01:36:02 GMT 2026 - 10.8K bytes - Click Count (0) -
src/main/webapp/WEB-INF/orig/view/chat/chat.jsp
aria-label="<la:message key="labels.chat_input_placeholder" />"></textarea> <button type="button" id="sendBtn" class="btn btn-primary" aria-label="<la:message key="labels.chat_send" />"> <i class="fa fa-paper-plane" aria-hidden="true"></i> </button> </div> <div class="input-footer"> <span class="input-hint"><la:message key="labels.chat_input_hint" /></span>
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 06:21:57 GMT 2026 - 10.4K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/BloomFilterStrategies.java
* @author Kurt Alfred Kluever */ enum BloomFilterStrategies implements BloomFilter.Strategy { /** * See "Less Hashing, Same Performance: Building a Better Bloom Filter" by Adam Kirsch and Michael * Mitzenmacher. The paper argues that this trick doesn't significantly deteriorate the * performance of a Bloom filter (yet only needs two 32bit hash functions). */ MURMUR128_MITZ_32() { @OverrideCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 10.7K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Crc32cHashFunction.java
* and then to XOR them together. The strideTable enables us to hash an int followed by 12 * zero bytes (3 ints), while the byteTable is for advancing one byte at a time. * This algorithm is due to the paper "Everything we know about CRC but [are] afraid to forget" * by Kadatch and Jenkins, 2010. */ Crc32cHasher() { super(16); } private boolean finished = false; /*Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Dec 28 01:26:26 GMT 2024 - 21.2K bytes - Click Count (0) -
doc/go_mem.html
can only have outcomes explained by some sequentially consistent interleaving of the goroutine executions. (The proof is the same as Section 7 of Boehm and Adve's paper cited above.) This property is called DRF-SC. </p> <p> The intent of the formal definition is to match the DRF-SC guarantee provided to race-free programs
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Aug 05 15:41:37 GMT 2025 - 26.6K bytes - Click Count (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of authorCreated: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Fri May 17 19:14:22 GMT 2024 - 38.5K bytes - Click Count (0) -
CREDITS
You should have received a copy of the GNU Affero General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Also add information on how to contact you by electronic and paper mail. If your software can interact with users remotely through a computer network, you should also make sure that it provides a way for users toCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Mar 13 05:29:51 GMT 2025 - 1.8M bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
"Efficient Software // Implementations of Modular Exponentiation" by Shay Gueron // [https://eprint.iacr.org/2011/239.pdf]. var c uint for i := 0; i < n; i++ { _ = T[n+i] // bounds check elimination hint // Step 1 (T = a × b) is computed as a large pen-and-paper column // multiplication of two numbers with n base-2^_W digits. If we just // wanted to produce 2n-wide T, we would do // // for i := 0; i < n; i++ { // d := bLimbs[i] // T[n+i] = addMulVVW(T[i:n+i], aLimbs, d) // } // // where d is a digit of the...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
"Efficient Software // Implementations of Modular Exponentiation" by Shay Gueron // [https://eprint.iacr.org/2011/239.pdf]. var c uint for i := 0; i < n; i++ { _ = T[n+i] // bounds check elimination hint // Step 1 (T = a × b) is computed as a large pen-and-paper column // multiplication of two numbers with n base-2^_W digits. If we just // wanted to produce 2n-wide T, we would do // // for i := 0; i < n; i++ { // d := bLimbs[i] // T[n+i] = addMulVVW(T[i:n+i], aLimbs, d) // } // // where d is a digit of the...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
RELEASE.md
* Adds `beta` hyperparameter to [FTRL](https://www.tensorflow.org/api_docs/python/tf/keras/optimizers/Ftrl) optimizer classes (Keras and others) to match [FTRL paper](https://research.google.com/pubs/archive/41159.pdf). * `Optimizer.__init__` now accepts a `gradient_aggregator` to allow for customization of how gradients are aggregated across devices, as well asCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Mon Mar 30 18:31:38 GMT 2026 - 746.5K bytes - Click Count (3)