- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for Natchev (0.15 sec)
-
ci/official/utilities/get_versions.sh
# nightly job. update_version.py affects TF_VER_SUFFIX, TF_VER_PYTHON, and # TF_VER_FULL. # Note: in awk, the command '/search/ {commands}' applies the commands to any line that # matches the /search/ regular expression. "print $N" prints the Nth "field", # where fields are strings separated by whitespace. export TF_VER_MAJOR=$(awk '/#define TF_MAJOR_VERSION/ {print $3}' tensorflow/core/public/version.h)
Shell Script - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Wed Jan 10 19:39:41 GMT 2024 - 2.3K bytes - Viewed (0) -
ci/official/containers/linux_arm64/builder.devtoolset/build_devtoolset.sh
rpm2cpio "devtoolset-10-gcc-10.2.1-11.2.el7.src.rpm" |cpio -idmv tar -xvf "gcc-10.2.1-20210130.tar.xz" --strip 1 ;; esac # Apply the devtoolset patches to gcc. /rpm-patch.sh "gcc.spec" ./contrib/download_prerequisites mkdir -p "${TARGET}-build" cd "${TARGET}-build" "${TARGET}-src/configure" \ --prefix="${TARGET}/usr" \
Shell Script - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Fri Sep 29 00:26:34 GMT 2023 - 6.1K bytes - Viewed (1) -
SECURITY.md
potentially exploit a vulnerability in the TensorFlow code that handles videos, which could allow them to execute arbitrary code on the system running TensorFlow. It is important to keep TensorFlow up to date with the latest security patches and follow the sandboxing guideline above to protect against these types of vulnerabilities. ## Security properties of execution modes TensorFlow has several execution modes, with Eager-mode being the default in v2.
Plain Text - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Sun Oct 01 06:06:35 GMT 2023 - 9.6K bytes - Viewed (0) -
tensorflow/c/eager/gradients.h
// Adds this tensor to the list of watched tensors. // // This is a no-op if the tensor is already being watched either from an // earlier call to `GradientTape::Watch` or being an output of an op with // watched inputs. void Watch(const AbstractTensorHandle*); // Records an operation with given inputs and outputs // on the tape and marks all its outputs as watched if at
C - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Mon Sep 26 10:27:05 GMT 2022 - 6.9K bytes - Viewed (0) -
ci/official/requirements_updater/requirements.in
dill == 0.3.7 astor == 0.7.1 typing_extensions == 4.8.0 gast == 0.4.0 termcolor == 2.3.0 wrapt == 1.16.0 tblib == 2.0.0 # Install tensorboard, and keras # Note that here we want the latest version that matches TF major.minor version # Note that we must use nightly here as these are used in nightly jobs # For release jobs, we will pin these on the release branch keras-nightly ~= 3.0.0.dev tb-nightly ~= 2.17.0.a
Plain Text - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Thu Feb 15 07:17:18 GMT 2024 - 806 bytes - Viewed (0) -
ci/official/containers/linux_arm64/devel.usertools/squash_testlogs.py
) except subprocess.CalledProcessError as e: print("No failures found to log!") exit(0) # For test cases, only show the ones that failed that have text (a log) seen = collections.Counter() runfiles_matcher = re.compile(r"(/.*\.runfiles/)") for f in files.strip().splitlines(): # Just ignore any failures, they're probably not important try: r = JUnitXml.fromfile(f)
Python - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Mon Sep 18 19:00:37 GMT 2023 - 4.8K bytes - Viewed (0) -
ci/official/containers/linux_arm64/builder.devtoolset/rpm-patch.sh
# See the License for the specific language governing permissions and # limitations under the License. # ============================================================================== # # Given an RPM spec file $1, apply its patches. SPEC="$1" grep '%patch' "${SPEC}" |while read cmd ; do N=$(echo "${cmd}" |sed 's,%patch\([0-9]\+\).*,\1,') file=$(grep "Patch$N:" "${SPEC}" |sed 's,.*: ,,') parg=$(echo "${cmd}" |sed 's,.*\(-p[0-9]\).*,\1,')
Shell Script - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Mon Sep 18 14:52:45 GMT 2023 - 1.1K bytes - Viewed (0)