Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 67 for infeasible (0.26 sec)

  1. .github/ISSUE_TEMPLATE/30_contributor_regression.yml

            You can use [the template](https://github.com/gradle/gradle-issue-reproducer) with a Gradle GitHub action set up to showcase your problem.
            In the rare cases where this is infeasible, we will also accept a detailed set of instructions.
            You can also use [Gradle Project Replicator](https://github.com/android/project-replicator) to reproduce the structure of your project.
        validations:
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Feb 16 07:49:32 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  2. .github/ISSUE_TEMPLATE/10_contributor_bug_report.yml

            You can use [the template](https://github.com/gradle/gradle-issue-reproducer) with a Gradle GitHub action set up to showcase your problem.
            In the rare cases where this is infeasible, we will also accept a detailed set of instructions.
            You can also use [Gradle Project Replicator](https://github.com/android/project-replicator) to reproduce the structure of your project.
        validations:
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Feb 16 07:49:32 UTC 2024
    - 3K bytes
    - Viewed (0)
  3. src/vendor/golang.org/x/crypto/internal/poly1305/poly1305.go

    // Package poly1305 implements Poly1305 one-time message authentication code as
    // specified in https://cr.yp.to/mac/poly1305-20050329.pdf.
    //
    // Poly1305 is a fast, one-time authentication function. It is infeasible for an
    // attacker to generate an authenticator for a message without the key. However, a
    // key must only be used for a single message. Authenticating two different
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Nov 09 20:10:44 UTC 2021
    - 3.3K bytes
    - Viewed (0)
  4. tensorflow/compiler/mlir/tensorflow/utils/cluster_util.cc

      // Whenever we see an operation that is assigned to an accelerator target
      // (ie. get_target(op) != ""), we try to merge it into the last cluster
      // of same target. If that is infeasible (say because of violating
      // def-before-use), create a new cluster with that operation and move on.
      llvm::StringMap<SmallVector<Cluster>> all_clusters;
      // Map from operation to the cluster that contains the operation.
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri Jul 28 00:32:55 UTC 2023
    - 8.3K bytes
    - Viewed (0)
  5. src/cmd/vendor/golang.org/x/tools/go/cfg/cfg.go

    // which must be non-nil.
    //
    // The CFG builder calls mayReturn to determine whether a given function
    // call may return.  For example, calls to panic, os.Exit, and log.Fatal
    // do not return, so the builder can remove infeasible graph edges
    // following such calls.  The builder calls mayReturn only for a
    // CallExpr beneath an ExprStmt.
    func New(body *ast.BlockStmt, mayReturn func(*ast.CallExpr) bool) *CFG {
    	b := builder{
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 02 02:20:05 UTC 2024
    - 7.7K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/hash/HashFunction.java

     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
     *       code, or even to discover <i>any</i> two distinct inputs that yield the same result. These
     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  7. guava/src/com/google/common/hash/HashFunction.java

     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
     *       code, or even to discover <i>any</i> two distinct inputs that yield the same result. These
     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  8. staging/src/k8s.io/api/storage/v1alpha1/types_swagger_doc_generated.go

    }
    
    func (VolumeAttributesClass) SwaggerDoc() map[string]string {
    	return map_VolumeAttributesClass
    }
    
    var map_VolumeAttributesClassList = map[string]string{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 03:26:35 UTC 2023
    - 10.6K bytes
    - Viewed (0)
  9. staging/src/k8s.io/api/storage/v1alpha1/generated.proto

      // The keys cannot be empty, and the maximum number of parameters is 512, with
      // a cumulative max size of 256K. If the CSI driver rejects invalid parameters,
      // the target PersistentVolumeClaim will be set to an "Infeasible" state in the
      // modifyVolumeStatus field.
      map<string, string> parameters = 3;
    }
    
    // VolumeAttributesClassList is a collection of VolumeAttributesClass objects.
    message VolumeAttributesClassList {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  10. src/internal/godebug/godebug.go

    // be reported by [runtime/metrics.Read]. The call must only happen when
    // the program executes a non-default behavior, not just when the setting
    // is set to a non-default value. This is occasionally (but very rarely)
    // infeasible, in which case the internal/godebugs table entry must set
    // Opaque: true, and the documentation in doc/godebug.md should
    // mention that metrics are unavailable.
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Sat Mar 09 14:19:39 UTC 2024
    - 9.4K bytes
    - Viewed (0)
Back to top