Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for Natchev (0.15 sec)

  1. ci/official/utilities/get_versions.sh

    # nightly job. update_version.py affects TF_VER_SUFFIX, TF_VER_PYTHON, and
    # TF_VER_FULL.
    
    # Note: in awk, the command '/search/ {commands}' applies the commands to any line that
    # matches the /search/ regular expression. "print $N" prints the Nth "field",
    # where fields are strings separated by whitespace.
    export TF_VER_MAJOR=$(awk '/#define TF_MAJOR_VERSION/ {print $3}' tensorflow/core/public/version.h)
    Shell Script
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jan 10 19:39:41 GMT 2024
    - 2.3K bytes
    - Viewed (0)
  2. ci/official/containers/linux_arm64/builder.devtoolset/build_devtoolset.sh

      rpm2cpio "devtoolset-10-gcc-10.2.1-11.2.el7.src.rpm" |cpio -idmv
      tar -xvf "gcc-10.2.1-20210130.tar.xz" --strip 1
      ;;
    esac
    
    # Apply the devtoolset patches to gcc.
    /rpm-patch.sh "gcc.spec"
    
    ./contrib/download_prerequisites
    
    mkdir -p "${TARGET}-build"
    cd "${TARGET}-build"
    
    "${TARGET}-src/configure" \
          --prefix="${TARGET}/usr" \
    Shell Script
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Fri Sep 29 00:26:34 GMT 2023
    - 6.1K bytes
    - Viewed (1)
  3. SECURITY.md

    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    It is important to keep TensorFlow up to date with the latest security patches
    and follow the sandboxing guideline above to protect against these types of
    vulnerabilities.
    
    ## Security properties of execution modes
    
    TensorFlow has several execution modes, with Eager-mode being the default in v2.
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
  4. tensorflow/c/eager/gradients.h

      // Adds this tensor to the list of watched tensors.
      //
      // This is a no-op if the tensor is already being watched either from an
      // earlier call to `GradientTape::Watch` or being an output of an op with
      // watched inputs.
      void Watch(const AbstractTensorHandle*);
      // Records an operation with given inputs and outputs
      // on the tape and marks all its outputs as watched if at
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Sep 26 10:27:05 GMT 2022
    - 6.9K bytes
    - Viewed (0)
  5. ci/official/requirements_updater/requirements.in

    dill == 0.3.7
    astor == 0.7.1
    typing_extensions == 4.8.0
    gast == 0.4.0
    termcolor == 2.3.0
    wrapt == 1.16.0
    tblib == 2.0.0
    
    # Install tensorboard, and keras
    # Note that here we want the latest version that matches TF major.minor version
    # Note that we must use nightly here as these are used in nightly jobs
    # For release jobs, we will pin these on the release branch
    keras-nightly ~= 3.0.0.dev
    tb-nightly ~= 2.17.0.a
    
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Thu Feb 15 07:17:18 GMT 2024
    - 806 bytes
    - Viewed (0)
  6. ci/official/containers/linux_arm64/devel.usertools/squash_testlogs.py

      )
    except subprocess.CalledProcessError as e:
      print("No failures found to log!")
      exit(0)
    
    # For test cases, only show the ones that failed that have text (a log)
    seen = collections.Counter()
    runfiles_matcher = re.compile(r"(/.*\.runfiles/)")
    
    
    for f in files.strip().splitlines():
      # Just ignore any failures, they're probably not important
      try:
        r = JUnitXml.fromfile(f)
    Python
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Sep 18 19:00:37 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  7. ci/official/containers/linux_arm64/builder.devtoolset/rpm-patch.sh

    # See the License for the specific language governing permissions and
    # limitations under the License.
    # ==============================================================================
    #
    # Given an RPM spec file $1, apply its patches.
    
    SPEC="$1"
    grep '%patch' "${SPEC}" |while read cmd ; do
      N=$(echo "${cmd}" |sed 's,%patch\([0-9]\+\).*,\1,')
      file=$(grep "Patch$N:" "${SPEC}" |sed 's,.*: ,,')
      parg=$(echo "${cmd}" |sed 's,.*\(-p[0-9]\).*,\1,')
    Shell Script
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Sep 18 14:52:45 GMT 2023
    - 1.1K bytes
    - Viewed (0)
Back to top