- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 82 for scenarios (0.05 sec)
-
.teamcity/src/main/kotlin/model/PerformanceTestSpec.kt
get() = PerformanceTestType.adHoc override val failsStage: Boolean get() = false val buildSpecs: List<FlameGraphGenerationBuildSpec> get() = scenarios.flatMap { scenario -> Os.values().flatMap { os -> val arch = if (os == Os.MACOS) Arch.AARCH64 else Arch.AMD64 if (os == Os.WINDOWS) { listOf("jprofiler")
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Thu Jul 18 07:02:47 UTC 2024 - 3.9K bytes - Viewed (0) -
docs/en/docs/tutorial/encoder.md
/// note `jsonable_encoder` is actually used by **FastAPI** internally to convert data. But it is useful in many other scenarios.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 23:31:16 UTC 2024 - 1.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/GeneratedMonitorTest.java
private GeneratedMonitorTest( Method method, Scenario scenario, boolean fair, @Nullable Timeout timeout, Outcome expectedOutcome) { super(nameFor(method, scenario, fair, timeout, expectedOutcome)); this.method = method; this.scenario = scenario; this.timeout = timeout; this.expectedOutcome = expectedOutcome;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:51:36 UTC 2024 - 27.1K bytes - Viewed (0) -
docs/en/docs/advanced/testing-dependencies.md
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 2.9K bytes - Viewed (0) -
guava-tests/test/com/google/common/util/concurrent/GeneratedMonitorTest.java
private GeneratedMonitorTest( Method method, Scenario scenario, boolean fair, @Nullable Timeout timeout, Outcome expectedOutcome) { super(nameFor(method, scenario, fair, timeout, expectedOutcome)); this.method = method; this.scenario = scenario; this.timeout = timeout; this.expectedOutcome = expectedOutcome;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:18:12 UTC 2024 - 27.1K bytes - Viewed (0) -
internal/http/dial_linux.go
} conn, err := dialer.DialContext(ctx, network, addr) if err != nil { return nil, err } if opts.DriveOPTimeout != nil { // Read deadlines are sufficient for now as per various // scenarios of hung node detection, we may add Write deadlines // if needed later on. return deadlineconn.New(conn).WithReadDeadline(opts.DriveOPTimeout()), nil } return conn, nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jul 23 10:53:03 UTC 2024 - 5K bytes - Viewed (0) -
guava-tests/test/com/google/common/base/AbstractIteratorTest.java
throw new AssertionError(); } }; assertThrows(IllegalStateException.class, iter::hasNext); } // Technically we should test other reentrant scenarios (4 combinations of // hasNext/next), but we'll cop out for now, knowing that // next() both start by invoking hasNext() anyway. /** Throws an undeclared checked exception. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Sep 17 18:14:12 UTC 2024 - 5.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/AbstractIteratorTest.java
throw new AssertionError(); } }; assertThrows(IllegalStateException.class, iter::hasNext); } // Technically we should test other reentrant scenarios (9 combinations of // hasNext/next/peek), but we'll cop out for now, knowing that peek() and // next() both start by invoking hasNext() anyway. /** Throws an undeclared checked exception. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Oct 15 17:36:06 UTC 2024 - 8.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/AbstractIteratorTest.java
throw new AssertionError(); } }; assertThrows(IllegalStateException.class, iter::hasNext); } // Technically we should test other reentrant scenarios (9 combinations of // hasNext/next/peek), but we'll cop out for now, knowing that peek() and // next() both start by invoking hasNext() anyway. /** Throws an undeclared checked exception. */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Oct 15 17:36:06 UTC 2024 - 8.1K bytes - Viewed (0) -
SECURITY.md
some form of isolation when dealing with untrusted data. As a result, this document also outlines what issues we consider as TensorFlow security vulnerabilities. We recognize issues as vulnerabilities only when they occur in scenarios that we outline as safe; issues that have a security impact only when TensorFlow is used in a discouraged way (e.g. running untrusted models or checkpoints, data parsing
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)