- Sort Score
- Num 10 results
- Language All
Results 851 - 860 of 881 for main (0.01 seconds)
-
tensorflow/c/c_api.cc
InvalidArgument("Attribute '", attr_name, "' is not a string"); return; } if (max_length <= 0) { return; } const auto& s = attr->s(); std::memcpy(value, s.data(), std::min<size_t>(s.length(), max_length)); } void TF_OperationGetAttrStringList(TF_Operation* oper, const char* attr_name, void** values, size_t* lengths,
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Sat Oct 04 05:55:32 GMT 2025 - 102.4K bytes - Click Count (0) -
cmd/httprange.go
switch { case resourceSize < 0: return 0, errors.New("Resource size cannot be negative") case h == nil: rangeLength = resourceSize case h.IsSuffixLength: specifiedLen := -h.Start rangeLength = min(specifiedLen, resourceSize) case h.Start >= resourceSize: return 0, InvalidRange{ OffsetBegin: h.Start, OffsetEnd: h.End, ResourceSize: resourceSize, } case h.End > -1: end := h.EndCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 5.9K bytes - Click Count (0) -
api/go1.5.txt
pkg net/http/fcgi, var ErrRequestAborted error pkg net/http/pprof, func Trace(http.ResponseWriter, *http.Request) pkg net/mail, method (*AddressParser) Parse(string) (*Address, error) pkg net/mail, method (*AddressParser) ParseList(string) ([]*Address, error) pkg net/mail, type AddressParser struct pkg net/mail, type AddressParser struct, WordDecoder *mime.WordDecoder pkg net/smtp, method (*Client) TLSConnectionState() (tls.ConnectionState, bool)
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Jul 30 21:14:09 GMT 2015 - 46.6K bytes - Click Count (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Sep 24 08:03:58 GMT 2024 - 8.3K bytes - Click Count (0) -
internal/ringbuffer/ring_buffer.go
} func (r *RingBuffer) read(p []byte) (n int, err error) { if r.w == r.r && !r.isFull { return 0, ErrIsEmpty } if r.w > r.r { n = min(r.w-r.r, len(p)) copy(p, r.buf[r.r:r.r+n]) r.r = (r.r + n) % r.size return n, err } n = min(r.size-r.r+r.w, len(p)) if r.r+n <= r.size { copy(p, r.buf[r.r:r.r+n]) } else { c1 := r.size - r.r copy(p, r.buf[r.r:r.size])
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 13.3K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/simple-oauth2.md
full_name = user_dict["full_name"], disabled = user_dict["disabled"], hashed_password = user_dict["hashed_password"], ) ``` /// info | Informação Para uma explicação mais completa de `**user_dict`, verifique [a documentação para **Extra Models**](../extra-models.md#about-user-in-dict){.internal-link target=_blank}. /// ## Retorne o token { #return-the-token }
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 10.3K bytes - Click Count (0) -
docs/pt/docs/tutorial/dependencies/index.md
Com o Sistema de Injeção de Dependência, você também pode informar ao **FastAPI** que sua *função de operação de rota* também "depende" em algo a mais que deve ser executado antes de sua *função de operação de rota*, e o **FastAPI** se encarrega de executar e "injetar" os resultados. Outros termos comuns para essa mesma ideia de "injeção de dependência" são: * recursos
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 10.7K bytes - Click Count (0) -
build-logic/documentation/src/main/groovy/gradlebuild/docs/GradleJavadocsPlugin.java
"<script src=\"https://cdnjs.cloudflare.com/ajax/libs/highlight.js/11.9.0/highlight.min.js\"></script>" + "<script src=\"https://cdnjs.cloudflare.com/ajax/libs/highlight.js/11.9.0/languages/kotlin.min.js\"></script>" + "<script src=\"https://cdnjs.cloudflare.com/ajax/libs/highlight.js/11.9.0/languages/groovy.min.js\"></script>" +Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Oct 02 14:18:24 GMT 2025 - 10.4K bytes - Click Count (0) -
SECURITY.md
TensorFlow models, please demonstrate an exploit against one of Alphabet's models in <https://tfhub.dev/> - An explanation of who can exploit this vulnerability, and what they gain when doing so. Write an attack scenario that demonstrates how your issue violates the use cases and security assumptions defined in the threat model.
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
docs/site-replication/run-replication-with-checksum-header.sh
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jan 20 14:49:07 GMT 2025 - 11.5K bytes - Click Count (0)