Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 160 of 248 for chains (0.12 sec)

  1. src/sync/mutex.go

    			// been woken or grabbed the lock, no need to wake anyone.
    			// In starvation mode ownership is directly handed off from unlocking
    			// goroutine to the next waiter. We are not part of this chain,
    			// since we did not observe mutexStarving when we unlocked the mutex above.
    			// So get off the way.
    			if old>>mutexWaiterShift == 0 || old&(mutexLocked|mutexWoken|mutexStarving) != 0 {
    				return
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 07 21:14:51 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  2. pkg/proxy/metrics/metrics.go

    // DescribeWithStability implements the metrics.StableCollector interface.
    func (n *nfacctMetricCollector) DescribeWithStability(ch chan<- *metrics.Desc) {
    	ch <- n.description
    }
    
    // CollectWithStability implements the metrics.StableCollector interface.
    func (n *nfacctMetricCollector) CollectWithStability(ch chan<- metrics.Metric) {
    	if n.client != nil {
    		counter, err := n.client.Get(n.counter)
    		if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  3. tensorflow/compiler/mlir/tensorflow/transforms/tf_passes.td

          %graph:6 = tf_executor.graph {
            %_, %chain_0_src = tf_executor.island wraps "tf.Identity"(%chain_0) : (tensor<i32>) -> tensor<i32>
            %_, %chain_1_src = tf_executor.island wraps "tf.Identity"(%chain_1) : (tensor<i32>) -> tensor<i32>
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Wed Jun 12 21:18:05 UTC 2024
    - 99.6K bytes
    - Viewed (0)
  4. src/crypto/internal/bigmod/nat.go

    	// Next we need to get from R to 2^(_W * n) R mod m (aka from one to R in
    	// the Montgomery domain, meaning we can use Montgomery multiplication now).
    	// We could do that by doubling _W * n times, or with a square-and-double
    	// chain log2(_W * n) long. Turns out the fastest thing is to start out with
    	// doublings, and switch to square-and-double once the exponent is large
    	// enough to justify the cost of the multiplications.
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 24K bytes
    - Viewed (0)
  5. guava/src/com/google/common/collect/CompactHashSet.java

       * part of the smeared hash of the element not covered by the hashtable mask, whereas the low bits
       * are the "next" pointer (pointing to the next entry in the bucket chain), which will always be
       * less than or equal to the hashtable mask.
       *
       * <pre>
       * hash  = aaaaaaaa
       * mask  = 00000fff
       * next  = 00000bbb
       * entry = aaaaabbb
       * </pre>
       *
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 28 18:11:09 UTC 2024
    - 24.9K bytes
    - Viewed (0)
  6. src/runtime/lock_sema.go

    		}
    		if i < spin {
    			procyield(active_spin_cnt)
    		} else if i < spin+passive_spin {
    			osyield()
    		} else {
    			// Someone else has it.
    			// l->waitm points to a linked list of M's waiting
    			// for this lock, chained through m->nextwaitm.
    			// Queue this M.
    			for {
    				gp.m.nextwaitm = muintptr(v &^ locked)
    				if atomic.Casuintptr(&l.key, v, uintptr(unsafe.Pointer(gp.m))|locked) {
    					break
    				}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 30 17:57:37 UTC 2024
    - 6.8K bytes
    - Viewed (0)
  7. security/pkg/k8s/chiron/utils_test.go

    05n8TGERBj7TLdtIVbtUIx3JHAo3PWJywA6mEDovFMJhJERp9sDHIr1BbhXK1TFN
    Z6HNH6gInkSSMtvC4Ptejb749PTaePRPF7ID//eq/3AH8UK50F3TQcLjEqWUsJUn
    aFKltOc+RAjzDklcUPeG4Y6eMA==
    -----END CERTIFICATE-----`
    
    	// exampleIssuedCert copied from samples/certs/cert-chain.pem
    	exampleIssuedCert = `-----BEGIN CERTIFICATE-----
    MIIDnzCCAoegAwIBAgIJAON1ifrBZ2/BMA0GCSqGSIb3DQEBCwUAMIGLMQswCQYD
    VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxl
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 03:58:11 UTC 2024
    - 13K bytes
    - Viewed (0)
  8. common/config/.golangci.yml

          - name: waitgroup-by-value
          - name: atomic
          - name: call-to-gc
          - name: duplicated-imports
          - name: string-of-int
          - name: defer
            arguments:
              - - "call-chain"
          - name: unconditional-recursion
          - name: identical-branches
            # the following rules can be enabled in the future
            # - name: empty-lines
            # - name: confusing-results
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 04 20:03:06 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  9. src/runtime/panic.go

    	throwTypeRuntime
    )
    
    // We have two different ways of doing defers. The older way involves creating a
    // defer record at the time that a defer statement is executing and adding it to a
    // defer chain. This chain is inspected by the deferreturn call at all function
    // exits in order to run the appropriate defer calls. A cheaper way (which we call
    // open-coded defers) is used for functions in which no defer statements occur in
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 43.8K bytes
    - Viewed (0)
  10. src/crypto/internal/nistec/p256_asm.go

    	// Since p = 3 mod 4, exponentiation by (p + 1) / 4 yields a square root candidate.
    	//
    	// The sequence of 7 multiplications and 253 squarings is derived from the
    	// following addition chain generated with github.com/mmcloughlin/addchain v0.4.0.
    	//
    	//	_10       = 2*1
    	//	_11       = 1 + _10
    	//	_1100     = _11 << 2
    	//	_1111     = _11 + _1100
    	//	_11110000 = _1111 << 4
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 21.4K bytes
    - Viewed (0)
Back to top