Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 14 of 14 for accelerate (0.15 sec)

  1. tensorflow/compiler/mlir/tensorflow/transforms/sparsecore/sparsecore_passes.td

      let summary = "Rewrite graph for embedding pipelining";
      let constructor = "TFDevice::CreateEmbeddingPipeliningPass()";
        let description = [{
        For architectures that support accelerated embedding lookups, this pass will
        rewrite the graph to use pipelining for better device utilization.
      }];
    }
    
    def EmbeddingSequencingPass : Pass<"tf-embedding-sequencing", "mlir::ModuleOp"> {
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Thu Mar 28 23:42:09 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  2. tensorflow/compiler/jit/pjrt_base_device.h

    #include "tensorflow/core/common_runtime/local_device.h"
    #include "tensorflow/core/framework/device_base.h"
    
    namespace tensorflow {
    
    // tensorflow::PjRtBaseDevice replaces the deprecated tensorflow::XlaDevice.
    // This accelerator agnostic device is mainly used to store metadata.
    class PjRtBaseDevice : public LocalDevice {
     public:
      // Stores metadata about the PjRtBaseDevice.
      class Metadata {
       public:
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Wed Feb 21 12:19:41 UTC 2024
    - 4K bytes
    - Viewed (0)
  3. tensorflow/compiler/mlir/tensorflow/utils/cluster_util.cc

        std::function<bool(Operation*)> is_ignored_op) {
      // Iteratively find clusters of different targets within the `block`.
      // Whenever we see an operation that is assigned to an accelerator target
      // (ie. get_target(op) != ""), we try to merge it into the last cluster
      // of same target. If that is infeasible (say because of violating
      // def-before-use), create a new cluster with that operation and move on.
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri Jul 28 00:32:55 UTC 2023
    - 8.3K bytes
    - Viewed (0)
  4. SECURITY.md

    implementation bugs that might allow attackers to leave malicious code running
    and leak or tamper with applications from other users. Please report
    vulnerabilities to the vendor of the affected hardware accelerator.
    
    ## Reporting vulnerabilities
    
    ### Vulnerabilities in TensorFlow
    
    This document covers different use cases for TensorFlow together with comments
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Sun Oct 01 06:06:35 UTC 2023
    - 9.6K bytes
    - Viewed (0)
Back to top