Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 164 for networks (0.19 sec)

  1. guava/src/com/google/common/graph/Network.java

     * subtype of {@code Network} that provides methods for adding and removing nodes and edges. If you
     * do not need to mutate a network (e.g. if you write a method than runs a read-only algorithm on
     * the network), you should use the non-mutating {@link Network} interface, or an {@link
     * ImmutableNetwork}.
     *
     * <p>You can create an immutable copy of an existing {@code Network} using {@link
     * ImmutableNetwork#copyOf(Network)}:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 10 15:41:27 UTC 2024
    - 22.4K bytes
    - Viewed (0)
  2. cni/pkg/install/cniconfig.go

    		// Assume it is a regular network conf file
    		delete(existingMap, "cniVersion")
    
    		plugins := make([]map[string]any, 2)
    		plugins[0] = existingMap
    		plugins[1] = istioMap
    
    		newMap = map[string]any{
    			"name":       "k8s-pod-network",
    			"cniVersion": "0.3.1",
    			"plugins":    plugins,
    		}
    	} else {
    		// Assume it is a network list file
    		newMap = existingMap
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 01 18:38:14 UTC 2024
    - 8.2K bytes
    - Viewed (0)
  3. common/scripts/kind_provisioner.sh

      POD_TO_POD_AND_SERVICE_CONNECTIVITY="${5}"
    
      C1_NODE="${C1}-control-plane"
      C2_NODE="${C2}-control-plane"
      C1_DOCKER_IP=$(docker inspect -f "{{ .NetworkSettings.Networks.kind.IPAddress }}" "${C1_NODE}")
      C2_DOCKER_IP=$(docker inspect -f "{{ .NetworkSettings.Networks.kind.IPAddress }}" "${C2_NODE}")
      if [ "${POD_TO_POD_AND_SERVICE_CONNECTIVITY}" -eq 1 ]; then
        # Set up routing rules for inter-cluster direct pod to pod & service communication
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Aug 21 04:47:23 UTC 2024
    - 17.2K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/graph/Network.java

     * subtype of {@code Network} that provides methods for adding and removing nodes and edges. If you
     * do not need to mutate a network (e.g. if you write a method than runs a read-only algorithm on
     * the network), you should use the non-mutating {@link Network} interface, or an {@link
     * ImmutableNetwork}.
     *
     * <p>You can create an immutable copy of an existing {@code Network} using {@link
     * ImmutableNetwork#copyOf(Network)}:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 10 15:41:27 UTC 2024
    - 21.1K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/graph/NetworkEquivalenceTest.java

                .allowsParallelEdges(!network.allowsParallelEdges())
                .allowsSelfLoops(!network.allowsSelfLoops())
                .build();
        g2.addEdge(N1, N2, E12);
    
        assertThat(network).isEqualTo(g2);
      }
    
      // Node/edge sets and node/edge connections are the same, but edge order differs.
      // (In this case the networks are considered equivalent; the edge add orderings are irrelevant.)
      @Test
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 16 17:21:56 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  6. guava-tests/test/com/google/common/graph/NetworkEquivalenceTest.java

                .allowsParallelEdges(!network.allowsParallelEdges())
                .allowsSelfLoops(!network.allowsSelfLoops())
                .build();
        g2.addEdge(N1, N2, E12);
    
        assertThat(network).isEqualTo(g2);
      }
    
      // Node/edge sets and node/edge connections are the same, but edge order differs.
      // (In this case the networks are considered equivalent; the edge add orderings are irrelevant.)
      @Test
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 16 17:21:56 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  7. ci/official/utilities/setup_docker.sh

      if [[ `uname -s | grep -P '^MSYS_NT'` ]]; then
        # Allow requests from the container.
        # Additional setup is contained in ci/official/envs/rbe.
        CONTAINER_IP_ADDR=$(docker inspect -f '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' tf)
        netsh advfirewall firewall add rule name="Allow Metadata Proxy" dir=in action=allow protocol=TCP localport=80 remoteip="$CONTAINER_IP_ADDR"
      fi
    
    fi
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Aug 09 16:05:18 UTC 2024
    - 2.8K bytes
    - Viewed (0)
  8. internal/http/dial_linux.go

    				if ip := net.ParseIP(address); ip != nil && !ip.IsLoopback() {
    					_ = syscall.SetsockoptString(fd, syscall.SOL_SOCKET, syscall.SO_BINDTODEVICE, opts.Interface)
    				}
    			}
    		})
    		return nil
    	}
    }
    
    // DialContext is a function to make custom Dial for internode communications
    type DialContext func(ctx context.Context, network, address string) (net.Conn, error)
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Jul 23 10:53:03 UTC 2024
    - 5K bytes
    - Viewed (0)
  9. cmd/mrf.go

    					continue
    				}
    				if wildcard.Match("tmp-old/*", u.Object) {
    					continue
    				}
    			}
    
    			now := time.Now()
    			if now.Sub(u.Queued) < time.Second {
    				// let recently failed networks to reconnect
    				// making MRF wait for 1s before retrying,
    				// i.e 4 reconnect attempts.
    				time.Sleep(time.Second)
    			}
    
    			// wait on timer per heal
    			wait := healSleeper.Timer(context.Background())
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 13 22:26:05 UTC 2024
    - 6.5K bytes
    - Viewed (0)
  10. SECURITY.md

    or networks.
    
    For performance reasons, the default TensorFlow server does not include any
    authorization protocol and sends messages unencrypted. It accepts connections
    from anywhere, and executes the graphs it is sent without performing any checks.
    Therefore, if you run a `tf.train.Server` in your network, anybody with access
    to the network can execute arbitrary code with the privileges of the user
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
Back to top