Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 2,567 for Function1 (0.25 sec)

  1. guava/src/com/google/common/hash/Hashing.java

        checkArgument(!list.isEmpty(), "number of hash functions (%s) must be > 0", list.size());
        return new ConcatenatedHashFunction(list.toArray(new HashFunction[0]));
      }
    
      private static final class ConcatenatedHashFunction extends AbstractCompositeHashFunction {
    
        private ConcatenatedHashFunction(HashFunction... functions) {
          super(functions);
          for (HashFunction function : functions) {
            checkArgument(
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue Apr 09 00:37:15 UTC 2024
    - 32.3K bytes
    - Viewed (0)
  2. tensorflow/compiler/mlir/tensorflow/transforms/xla_call_module_serialization.cc

      }
      return bytecode;
    }
    
    // Serializes the stablehlo functions called by XlaCallModuleOp to bytecode
    // and embeds the bytecode in XlaCallModuleOp's `module` attribute.
    //
    // The stablehlo functions include the function referred by XlaCallModuleOp's
    // `_entry_function` attribute, and any stablehlo functions called transitively
    // from the entry function.
    LogicalResult SerializeXlaCallModule(SymbolTableCollection& symbol_table,
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Thu Apr 25 16:01:03 UTC 2024
    - 9.5K bytes
    - Viewed (0)
  3. src/cmd/compile/internal/ir/func.go

    	// within a package.
    	ABIRefs obj.ABISet
    
    	NumDefers  int32 // number of defer calls in the function
    	NumReturns int32 // number of explicit returns in the function
    
    	// NWBRCalls records the LSyms of functions called by this
    	// function for go:nowritebarrierrec analysis. Only filled in
    	// if nowritebarrierrecCheck != nil.
    	NWBRCalls *[]SymAndPos
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:05:44 UTC 2024
    - 21.1K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/dependencies/index.md

    As dependencies will also be called by **FastAPI** (the same as your *path operation functions*), the same rules apply while defining your functions.
    
    You can use `async def` or normal `def`.
    
    And you can declare dependencies with `async def` inside of normal `def` *path operation functions*, or `def` dependencies inside of `async def` *path operation functions*, etc.
    
    It doesn't matter. **FastAPI** will know what to do.
    
    !!! note
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu Apr 18 19:53:19 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  5. tensorflow/compiler/mlir/tensorflow/transforms/xla_call_module_deserialization.cc

      return std::move(*loader).module();
    }
    
    // Renames functions in the stablehlo module to avoid naming conflicts with
    // existing functions in the tf module.
    // Sets _from_xla_call_module attribute for each stablehlo function.
    // Returns the new stablehlo main function's name or error.
    //
    // If we directly insert stablehlo functions into tf module, MLIR will rename
    // the stablehlo functions themselves in the tf module automatically to avoid
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Thu May 23 09:05:47 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/hash/Hashing.java

        checkArgument(!list.isEmpty(), "number of hash functions (%s) must be > 0", list.size());
        return new ConcatenatedHashFunction(list.toArray(new HashFunction[0]));
      }
    
      private static final class ConcatenatedHashFunction extends AbstractCompositeHashFunction {
    
        private ConcatenatedHashFunction(HashFunction... functions) {
          super(functions);
          for (HashFunction function : functions) {
            checkArgument(
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue Apr 09 00:37:15 UTC 2024
    - 29.2K bytes
    - Viewed (0)
  7. src/cmd/vendor/golang.org/x/tools/go/analysis/passes/printf/doc.go

    //
    // The -funcs flag specifies a comma-separated list of names of
    // additional known formatting functions or methods. (This legacy flag
    // is rarely used due to the automatic inference described above.)
    //
    // If the name contains a period, it must denote a specific function
    // using one of the following forms:
    //
    //	dir/pkg.Function
    //	dir/pkg.Type.Method
    //	(*dir/pkg.Type).Method
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 03 02:38:00 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  8. src/runtime/HACKING.md

      because they have untyped words on the stack.
    
    - Functions that must not be preempted on entry.
    
    - Functions that may run without a valid G. For example, functions
      that run in early runtime start-up, or that may be entered from C
      code such as cgo callbacks or the signal handler.
    
    Splittable functions ensure there's some amount of space on the stack
    for nosplit functions to run in and the linker checks that any static
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 19:53:03 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  9. src/cmd/vendor/golang.org/x/tools/go/analysis/passes/unusedresult/unusedresult.go

    // results of calls to certain functions.
    package unusedresult
    
    // It is tempting to make this analysis inductive: for each function
    // that tail-calls one of the functions that we check, check those
    // functions too. However, just because you must use the result of
    // fmt.Sprintf doesn't mean you need to use the result of every
    // function that returns a formatted string: it may have other results
    // and effects.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jan 22 19:00:13 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  10. src/vendor/golang.org/x/crypto/sha3/doc.go

    // Package sha3 implements the SHA-3 fixed-output-length hash functions and
    // the SHAKE variable-output-length hash functions defined by FIPS-202.
    //
    // Both types of hash function use the "sponge" construction and the Keccak
    // permutation. For a detailed specification see http://keccak.noekeon.org/
    //
    // # Guidance
    //
    // If you aren't sure what function you need, use SHAKE256 with at least 64
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Apr 10 16:37:53 UTC 2024
    - 3.1K bytes
    - Viewed (0)
Back to top