Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for who (0.21 sec)

  1. tensorflow/c/eager/tfe_context_internal.h

    // Wraps a pointer to a context implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying context object. Instead, call
    // TFE_DeleteContext who calls Release() on the context pointer and deletes
    // the TFE_Context structure.
    typedef struct TFE_Context TFE_Context;
    
    namespace tensorflow {
    
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.4K bytes
    - Viewed (0)
  2. tensorflow/c/eager/tfe_op_internal.h

    // Wraps a pointer to an operation implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying operation object. Instead, call
    // TFE_DeleteOp who calls Release() on the operation pointer and deletes
    // the TFE_Op structure.
    typedef struct TFE_Op TFE_Op;
    
    namespace tensorflow {
    
    DEFINE_CONVERSION_FUNCTIONS(tensorflow::ImmediateExecutionOperation, TFE_Op);
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.4K bytes
    - Viewed (0)
  3. tensorflow/c/eager/tfe_tensorhandle_internal.h

    // Wraps a pointer to a tensor handle implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying handle object. Instead, call
    // TFE_DeleteTensorHandle who calls Release() on the handle pointer and deletes
    // the TFE_TensorHandle structure.
    typedef struct TFE_TensorHandle TFE_TensorHandle;
    
    namespace tensorflow {
    
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.6K bytes
    - Viewed (0)
  4. SECURITY.md

        how we can reproduce your findings. For memory corruption triggerable in
        TensorFlow models, please demonstrate an exploit against one of Alphabet's
        models in <https://tfhub.dev/>
      - An explanation of who can exploit this vulnerability, and what they gain
        when doing so. Write an attack scenario that demonstrates how your issue
        violates the use cases and security assumptions defined in the threat model.
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
  5. CONTRIBUTING.md

        its dependencies and the rest of the system.
    -   Rarely, If the tests fail at this stage, we cannot merge the code.
    -   If needed, we may come to you to make some changes. At times, it may not be
        you, it may be us who may have hit a snag. Please be patient while we work
        to fix this.
    -   Once the internal tests pass, we go ahead and merge the code internally as
        well as externally on GitHub.
    
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Thu Mar 21 11:45:51 GMT 2024
    - 15.6K bytes
    - Viewed (0)
  6. tensorflow/c/c_api.cc

        result = session->Run(run_options_proto, input_pairs, output_tensor_names,
                              target_oper_names, &outputs, &run_metadata_proto);
    
        // Serialize back to upstream client, who now owns the new buffer
        if (run_metadata != nullptr) {
          status->status = MessageToBuffer(run_metadata_proto, run_metadata);
          if (!status->status.ok()) return;
        }
      } else {
    C++
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Apr 15 03:35:10 GMT 2024
    - 102.3K bytes
    - Viewed (0)
  7. RELEASE.md

    *  `tf.Tensor`
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Apr 29 19:17:57 GMT 2024
    - 727.7K bytes
    - Viewed (8)
Back to top