Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 843 for complex (0.06 sec)

  1. doc/go_mem.html

    For example, a compiler must not discard <code>i</code> and reload it
    a second time from <code>*p</code> in this program:
    </p>
    
    <pre>
    i := *p
    if i &lt; 0 || i &gt;= len(funcs) {
    	panic("invalid function index")
    }
    ... complex code ...
    // compiler must NOT reload i = *p here
    funcs[i]()
    </pre>
    
    <p>
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Mar 04 15:54:42 UTC 2024
    - 26.6K bytes
    - Viewed (0)
  2. tensorflow/c/eager/gradients.h

    //     grad_outputs[1]->Ref();
    //     return OkStatus();
    //   }
    //   ~AddGradientFunction() override {}
    // };
    //
    // GradientFunction* AddRegisterer(const ForwardOperation& op) {
    //   // More complex gradient functions can use inputs/attrs etc. from the
    //   // forward `op`.
    //   return new AddGradientFunction;
    // }
    //
    // Status RegisterGradients(GradientRegistry* registry) {
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Sat Oct 12 05:11:17 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  3. compat/maven-compat/src/main/java/org/apache/maven/artifact/resolver/ArtifactResolutionResult.java

     *   <li>network/transfer errors</li>
     *   <li>file system errors: permissions</li>
     * </ul>
     *
     * TODO carlos: all these possible has*Exceptions and get*Exceptions methods make the clients too
     *       complex requiring a long list of checks, need to create a parent/interface/encapsulation
     *       for the types of exceptions
     */
    @Deprecated
    public class ArtifactResolutionResult {
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/events/v1beta1/generated.proto

      // it acts on some changes in a ReplicaSet object.
      // +optional
      optional k8s.io.api.core.v1.ObjectReference regarding = 8;
    
      // related is the optional secondary object for more complex actions. E.g. when regarding object triggers
      // a creation or deletion of related object.
      // +optional
      optional k8s.io.api.core.v1.ObjectReference related = 9;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 29 11:02:16 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  7. pyproject.toml

        "C4",  # flake8-comprehensions
        "UP",  # pyupgrade
    ]
    ignore = [
        "E501",  # line too long, handled by black
        "B008",  # do not perform function calls in argument defaults
        "C901",  # too complex
        "W191",  # indentation contains tabs
    ]
    
    [tool.ruff.lint.per-file-ignores]
    "__init__.py" = ["F401"]
    "docs_src/dependencies/tutorial007.py" = ["F821"]
    "docs_src/dependencies/tutorial008.py" = ["F821"]
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 22 14:19:56 UTC 2024
    - 7.9K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/events/v1/generated.proto

      // it acts on some changes in a ReplicaSet object.
      // +optional
      optional k8s.io.api.core.v1.ObjectReference regarding = 8;
    
      // related is the optional secondary object for more complex actions. E.g. when regarding object triggers
      // a creation or deletion of related object.
      // +optional
      optional k8s.io.api.core.v1.ObjectReference related = 9;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/AbstractMapBasedMultiset.java

      }
    
      @Override
      public final void clear() {
        backingMap.clear();
        size = 0;
      }
    
      /**
       * Skeleton of per-entry iterators. We could push this down and win a few bytes, but it's complex
       * enough it's not especially worth it.
       */
      abstract class Itr<T extends @Nullable Object> implements Iterator<T> {
        int entryIndex = backingMap.firstIndex();
        int toRemove = -1;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Mar 06 16:06:58 UTC 2023
    - 8.2K bytes
    - Viewed (0)
  10. docs/en/docs/history-design-future.md

    > What’s the history of this project? It seems to have come from nowhere to awesome in a few weeks [...]
    
    Here's a little bit of that history.
    
    ## Alternatives
    
    I have been creating APIs with complex requirements for several years (Machine Learning, distributed systems, asynchronous jobs, NoSQL databases, etc), leading several teams of developers.
    
    As part of that, I needed to investigate, test and use many alternatives.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon Jul 29 23:35:07 UTC 2024
    - 4.1K bytes
    - Viewed (0)
Back to top