Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 126 for art5 (0.16 sec)

  1. guava/src/com/google/common/math/DoubleMath.java

        long count = 1;
        double mean = checkFinite(values[0]);
        for (int index = 1; index < values.length; ++index) {
          checkFinite(values[index]);
          count++;
          // Art of Computer Programming vol. 2, Knuth, 4.2.2, (15)
          mean += (values[index] - mean) / count;
        }
        return mean;
      }
    
      /**
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Wed Feb 07 17:50:39 UTC 2024
    - 18.9K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/Collections2.java

       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
       * first permutation will be in ascending order, and the last will be in descending order.
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Mon Apr 01 16:15:01 UTC 2024
    - 22.8K bytes
    - Viewed (0)
  3. docs/de/docs/deployment/concepts.md

    # Deployment-Konzepte
    
    Bei dem Deployment – der Bereitstellung – einer **FastAPI**-Anwendung, oder eigentlich jeder Art von Web-API, gibt es mehrere Konzepte, die Sie wahrscheinlich interessieren, und mithilfe der Sie die **am besten geeignete** Methode zur **Bereitstellung Ihrer Anwendung** finden können.
    
    Einige wichtige Konzepte sind:
    
    * Sicherheit – HTTPS
    * Beim Hochfahren ausführen
    * Neustarts
    * Replikation (die Anzahl der laufenden Prozesse)
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Sat Mar 30 20:16:25 UTC 2024
    - 20.6K bytes
    - Viewed (0)
  4. guava/src/com/google/common/collect/Collections2.java

       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
       * first permutation will be in ascending order, and the last will be in descending order.
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Mon Apr 01 16:15:01 UTC 2024
    - 23.1K bytes
    - Viewed (0)
  5. docs/de/docs/deployment/manually.md

    Wenn man sich auf die entfernte Maschine bezieht, wird sie üblicherweise als **Server**, aber auch als **Maschine**, **VM** (virtuelle Maschine) oder **Knoten** bezeichnet. Diese Begriffe beziehen sich auf irgendeine Art von entfernten Rechner, normalerweise unter Linux, auf dem Sie Programme ausführen.
    
    ## Das Serverprogramm installieren
    
    Sie können einen ASGI-kompatiblen Server installieren mit:
    
    === "Uvicorn"
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Sat Mar 30 20:16:35 UTC 2024
    - 5.4K bytes
    - Viewed (0)
  6. tensorflow/compiler/mlir/lite/tests/quantize.mlir

    // CHECK: %4 = "tfl.custom_tf"(%arg0, %arg1, %arg2, %arg3) ({
    // CHECK-NEXT: ^bb0(%arg4: tensor<128x128xf32>, %arg5: tensor<1xf32>, %arg6: tensor<1xf32>, %arg7: tensor<1xi32>):
    // CHECK-NEXT:   "tf.LayerNorm"(%arg4, %arg5, %arg6, %arg7) {_tfl_quant_trait = "fully_quantizable", device = ""} : (tensor<128x128xf32>, tensor<1xf32>, tensor<1xf32>, tensor<1xi32>) -> tensor<128x128xf32>
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Tue May 28 23:10:13 UTC 2024
    - 39.7K bytes
    - Viewed (0)
  7. src/cmd/vendor/golang.org/x/sys/unix/syscall_linux.go

    // optional arguments arg2 through arg5 depending on option. It returns a
    // non-negative integer that is returned by the prctl syscall.
    func PrctlRetInt(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (int, error) {
    	ret, _, err := Syscall6(SYS_PRCTL, uintptr(option), uintptr(arg2), uintptr(arg3), uintptr(arg4), uintptr(arg5), 0)
    	if err != 0 {
    		return 0, err
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Mar 07 05:26:45 UTC 2024
    - 77.5K bytes
    - Viewed (0)
  8. platforms/extensibility/test-kit/src/test/groovy/org/gradle/testkit/runner/internal/DefaultGradleRunnerTest.groovy

            then:
            runner.arguments == originalArguments
            runner.jvmArguments == originalJvmArguments
            runner.pluginClasspath == originalClasspath
    
            when:
            originalArguments << 'arg5'
            originalJvmArguments << 'arg6'
            originalClasspath << new File('file:///Users/foo/bar/other.jar')
    
            then:
            runner.arguments == ['arg1', 'arg2']
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Thu Nov 16 22:36:52 UTC 2023
    - 13.2K bytes
    - Viewed (1)
  9. docs/de/docs/advanced/security/http-basic-auth.md

    if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"):
        # Einen Error zurückgeben
        ...
    ```
    
    Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden.
    
    ### Timing-Angriffe
    
    Aber was ist ein „Timing-Angriff“?
    
    Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Sat Mar 30 20:28:08 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  10. tensorflow/compiler/mlir/quantization/tensorflow/tests/replace_cast_hacks_with_tf_xla_ops.mlir

        return %3 : tensor<1x3x2x2xf32>
      }
      func.func private @quantized_conv2d_with_bias_and_relu_fn_0(%arg0: tensor<1x3x4x3xi8>, %arg1: tensor<2x3x3x2xi8>, %arg2: tensor<2xi32>, %arg3: tensor<f32>, %arg4: tensor<i32>, %arg5: tensor<f32>, %arg6: tensor<i32>, %arg7: tensor<f32>, %arg8: tensor<i32>, %arg9: tensor<f32>, %arg10: tensor<i32>) -> tensor<1x3x2x2xi8> {
        %cst = "tf.Const"() {value = dense<127> : tensor<i32>} : () -> tensor<i32>
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Mon Oct 30 06:52:55 UTC 2023
    - 81K bytes
    - Viewed (0)
Back to top