Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for who (0.12 sec)

  1. tensorflow/c/eager/tfe_context_internal.h

    // Wraps a pointer to a context implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying context object. Instead, call
    // TFE_DeleteContext who calls Release() on the context pointer and deletes
    // the TFE_Context structure.
    typedef struct TFE_Context TFE_Context;
    
    namespace tensorflow {
    
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.4K bytes
    - Viewed (0)
  2. tensorflow/c/eager/tfe_op_internal.h

    // Wraps a pointer to an operation implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying operation object. Instead, call
    // TFE_DeleteOp who calls Release() on the operation pointer and deletes
    // the TFE_Op structure.
    typedef struct TFE_Op TFE_Op;
    
    namespace tensorflow {
    
    DEFINE_CONVERSION_FUNCTIONS(tensorflow::ImmediateExecutionOperation, TFE_Op);
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.4K bytes
    - Viewed (0)
  3. tensorflow/c/eager/tfe_tensorhandle_internal.h

    // Wraps a pointer to a tensor handle implementation.
    //
    // WARNING: Since the underlying object could be ref-counted a user of this
    // interface cannot destruct the underlying handle object. Instead, call
    // TFE_DeleteTensorHandle who calls Release() on the handle pointer and deletes
    // the TFE_TensorHandle structure.
    typedef struct TFE_TensorHandle TFE_TensorHandle;
    
    namespace tensorflow {
    
    C
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Wed Jun 17 19:39:13 GMT 2020
    - 1.6K bytes
    - Viewed (0)
  4. SECURITY.md

        how we can reproduce your findings. For memory corruption triggerable in
        TensorFlow models, please demonstrate an exploit against one of Alphabet's
        models in <https://tfhub.dev/>
      - An explanation of who can exploit this vulnerability, and what they gain
        when doing so. Write an attack scenario that demonstrates how your issue
        violates the use cases and security assumptions defined in the threat model.
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top