Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 82 for hardware (0.24 sec)

  1. SECURITY.md

    TensorFlow in a multitenant design mixes the risks described above with the
    inherent ones from multitenant configurations. The primary areas of concern are
    tenant isolation, resource allocation, model sharing and hardware attacks.
    
    ### Tenant isolation
    
    Since any tenants or users providing models, graphs or checkpoints can execute
    code in context of the TensorFlow service, it is important to design isolation
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Sun Oct 01 06:06:35 UTC 2023
    - 9.6K bytes
    - Viewed (0)
  2. src/internal/syscall/windows/version_windows.go

    // license that can be found in the LICENSE file.
    
    package windows
    
    import (
    	"errors"
    	"sync"
    	"syscall"
    	"unsafe"
    )
    
    // https://learn.microsoft.com/en-us/windows-hardware/drivers/ddi/wdm/ns-wdm-_osversioninfow
    type _OSVERSIONINFOW struct {
    	osVersionInfoSize uint32
    	majorVersion      uint32
    	minorVersion      uint32
    	buildNumber       uint32
    	platformId        uint32
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Mar 21 11:49:46 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  3. src/hash/crc32/crc32_generic.go

    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    // This file contains CRC32 algorithms that are not specific to any architecture
    // and don't use hardware acceleration.
    //
    // The simple (and slow) CRC32 implementation only uses a 256*4 bytes table.
    //
    // The slicing-by-8 algorithm is a faster implementation that uses a bigger
    // table (8*256*4 bytes).
    
    package crc32
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Sat May 18 22:36:41 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  4. tensorflow/compiler/mlir/quantization/stablehlo/cc/pass_pipeline.h

    // exported as a TF SavedModel.
    void AddCallModuleSerializationPasses(OpPassManager& pm);
    
    // Passes for unpacking quantized ops to int valued StableHLO ops. This is
    // useful when uniform quantized types are suboptimal for the hardware. It goes
    // through a StableHLO <-> MHLO roundtrip to utilize the MHLOQuantToInt pass.
    void AddStablehloQuantToIntPasses(OpPassManager& pm);
    
    // Processes tensors with NCHW format (== (batch, channel, height, weight)) by
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Mon Apr 15 12:53:33 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  5. src/crypto/crypto.go

    // can be used for increased type safety within applications.
    type PrivateKey any
    
    // Signer is an interface for an opaque private key that can be used for
    // signing operations. For example, an RSA key kept in a hardware module.
    type Signer interface {
    	// Public returns the public key corresponding to the opaque,
    	// private key.
    	Public() PublicKey
    
    	// Sign signs digest with the private key, possibly using entropy from
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 6.8K bytes
    - Viewed (0)
  6. tensorflow/compiler/mlir/quantization/stablehlo/python/integration_test/stablehlo_quantizer_odml_oss.ipynb

        },
        {
          "cell_type": "markdown",
          "metadata": {
            "id": "FacwMD9MPUew"
          },
          "source": [
            "StableHLO Quantizer is a quantization API to enable ML framework optionality and hardware retargetability."
          ]
        },
        {
          "cell_type": "code",
          "execution_count": null,
          "metadata": {
            "id": "RXZUHZQoQZOo"
          },
          "outputs": [],
          "source": [
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri Apr 12 03:40:43 UTC 2024
    - 5.4K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/hash/LittleEndianByteArray.java

            // The hardware is big-endian, so we need to reverse the order of the bytes.
            return Long.reverseBytes(bigEndian);
          }
    
          @Override
          public void putLongLittleEndian(byte[] array, int offset, long value) {
            // Reverse the order of the bytes before storing, since we're on big-endian hardware.
            long littleEndianValue = Long.reverseBytes(value);
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Fri Jun 07 22:25:23 UTC 2024
    - 9.7K bytes
    - Viewed (0)
  8. pkg/apis/resource/namedresources.go

    type NamedResourcesResources struct {
    	// The list of all individual resources instances currently available.
    	Instances []NamedResourcesInstance
    }
    
    // NamedResourcesInstance represents one individual hardware instance that can be selected based
    // on its attributes.
    type NamedResourcesInstance struct {
    	// Name is unique identifier among all resource instances managed by
    	// the driver on the node. It must be a DNS subdomain.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 22 12:18:45 UTC 2024
    - 3.8K bytes
    - Viewed (0)
  9. test/nilptr.go

    // at a 256 MB offset from a nil pointer might not
    // cause a memory access fault. This test checks
    // that Go is doing the correct explicit checks to catch
    // these nil pointer accesses, not just relying on the hardware.
    var dummy [256 << 20]byte // give us a big address space
    
    func main() {
    	// the test only tests what we intend to test
    	// if dummy starts in the first 256 MB of memory.
    	// otherwise there might not be anything mapped
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 19 23:33:25 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  10. test/nilptr_aix.go

    // at a 1G + 256 MB offset from a nil pointer might not
    // cause a memory access fault. This test checks
    // that Go is doing the correct explicit checks to catch
    // these nil pointer accesses, not just relying on the hardware.
    // The reason of the 1G offset is because AIX addresses start after 1G.
    var dummy [256 << 20]byte // give us a big address space
    
    func main() {
    	// the test only tests what we intend to test
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 19 23:33:25 UTC 2023
    - 3.1K bytes
    - Viewed (0)
Back to top