Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for detect (0.15 sec)

  1. SECURITY.md

    users are aware of the security risks detailed here and that they are going to
    be practically running code provided by other users. Currently there are no good
    ways to detect malicious models/graphs/checkpoints, so the recommended way to
    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
  2. ci/official/utilities/code_check_changed_files.bats

    # limitations under the License.
    # ==============================================================================
    
    setup_file() {
        bazel version  # Start the bazel server
    
        # Fixes "fatal: detected dubious ownership in repository" for Docker.
        git config --system --add safe.directory '*'
        git config --system protocol.file.allow always
    
        # Note that you could generate a list of all the affected targets with e.g.:
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jan 10 19:39:41 GMT 2024
    - 4K bytes
    - Viewed (0)
  3. tensorflow/c/c_api_internal.h

          TF_GUARDED_BY(mu);
    
      // The keys of this map are all the active sessions using this graph. Each
      // value records whether the graph has been mutated since the corresponding
      // session has been run (this is detected in RecordMutation function). If the
      // string is empty, no mutation has occurred. Otherwise the string is a
      // description of the mutation suitable for returning to the user.
      //
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Sat May 13 00:49:12 GMT 2023
    - 7.6K bytes
    - Viewed (0)
  4. ci/official/containers/linux_arm64/builder.devtoolset/fixlinks_aarch64.sh

    # See the License for the specific language governing permissions and
    # limitations under the License.
    # ==============================================================================
    #
    # Re-direct all links in $1 that are relative to be canonical
    
    BASE="$1"
    find "${BASE}" -type l | \
      while read l ; do
        if [[ "$(readlink "$l")" == \.\./* ]]; then
          CANONICAL="$(readlink "$l")";
          rm "$l";
    Shell Script
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Sep 18 14:52:45 GMT 2023
    - 969 bytes
    - Viewed (0)
Back to top