Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 17 of 17 for added (0.16 sec)

  1. ci/official/containers/linux_arm64/devel.usertools/code_check_changed_files.bats

        # Note that you could generate a list of all the affected targets with e.g.:
        # bazel query $(paste -sd "+" $BATS_FILE_TMPDIR/changed_files) --keep_going
        # Only shows Added, Changed, Modified, Renamed, and Type-changed files
        if [[ "$(git rev-parse --abbrev-ref HEAD)" = "pull_branch" ]]; then
            # TF's CI runs 'git fetch origin "pull/PR#/merge:pull_branch"'
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Mon Sep 18 14:52:45 GMT 2023
    - 3.6K bytes
    - Viewed (0)
  2. .bazelrc

    build:rbe_linux_cpu --platforms="@sigbuild-r2.17-clang_config_platform//:platform"
    # This is needed for all Clang17 builds but must not be present in GCC builds.
    build:rbe_linux_cpu --copt=-Wno-error=unused-command-line-argument
    # This was added in clang-16 by https://reviews.llvm.org/D133574.
    # Can be removed once upb is updated, since a type definition is used within
    # offset of in the current version of ubp.
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Thu May 02 19:34:20 GMT 2024
    - 52.8K bytes
    - Viewed (2)
  3. tensorflow/c/c_api.cc

          GraphDef graph_def;
          *graph_def.mutable_versions() = graph.versions();
          // Fill graph_def with nodes with ids in the range
          // [session->last_num_graph_nodes, num_nodes), that is the nodes
          // added since the last TF_SessionRun() call.
          for (auto id = session->last_num_graph_nodes; id < num_nodes; ++id) {
            Node* const node = graph.FindNodeId(id);
            if (node != nullptr && node->IsOp()) {
    C++
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Apr 15 03:35:10 GMT 2024
    - 102.3K bytes
    - Viewed (0)
  4. tensorflow/c/c_api_function_test.cc

      ASSERT_EQ(TF_OK, TF_GetCode(s_)) << TF_Message(s_);
      TF_GraphCopyFunction(host_graph_, grad_func, nullptr, s_);
      ASSERT_EQ(TF_OK, TF_GetCode(s_)) << TF_Message(s_);
    
      // Check that functions are added but not linked
      GraphDef gdef;
      GetGraphDef(host_graph_, &gdef);
      std::vector<string> func_names = GetFuncNames(gdef);
      ASSERT_EQ(2, func_names.size());
      ASSERT_EQ("FooFunc", func_names[0]);
    C++
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Thu Jul 20 22:08:54 GMT 2023
    - 63.6K bytes
    - Viewed (6)
  5. tensorflow/BUILD

            "//conditions:default": ":libtensorflow_framework.so.%s" % VERSION_MAJOR,
        }),
    )
    
    # -------------------------------------------
    # New rules should be added above this target.
    # -------------------------------------------
    
    # TensorFlow uses several libraries that may also be used by applications
    # linking against the C and C++ APIs (such as libjpeg).  When we create
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Tue Apr 09 18:15:11 GMT 2024
    - 53.4K bytes
    - Viewed (8)
  6. configure.py

        return None
    
      print('You have Clang %s installed.\n' % curr_version)
      return curr_version
    
    
    # Disable clang extension that rejects type definitions within offsetof.
    # This was added in clang-16 by https://reviews.llvm.org/D133574.
    # Still required for clang-17.
    # Can be removed once upb is updated, since a type definition is used within
    # offset of in the current version of ubp. See
    Python
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Mon Apr 15 18:25:36 GMT 2024
    - 53.8K bytes
    - Viewed (1)
  7. SECURITY.md

    when dealing with untrusted data. Based on the security history of these
    libraries we consider that it is safe to work with untrusted inputs for PNG,
    BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats,
    including tensorflow-io should be sandboxed if used to process untrusted data.
    
    For example, if an attacker were to upload a malicious video file, they could
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top